1. https://www.dhs.gov/cisa/critical-infrastructure-sectors https://www.dhs.gov/cisa/critical-infrastructure-sectors
2. https://www.accaglobal.com/ie/en/student/sa/features/cyber.html https://www.accaglobal.com/ie/en/student/sa/features/cyber.html
3. Gordon L. A. & Loeb M. P. (2006). Managing cybersecurity resources: a cost-benefit analysis (Vol. 1). New York: McGraw-Hill. Gordon L. A. & Loeb M. P. (2006). Managing cybersecurity resources: a cost-benefit analysis (Vol. 1). New York: McGraw-Hill.
4. https://www.icaew.com/about-icaew/news/press-release-archive/2017-press-releases/regions-2017/tv-cyber-attack https://www.icaew.com/about-icaew/news/press-release-archive/2017-press-releases/regions-2017/tv-cyber-attack
5. Cybersecurity strategy: A primer for policy makers and those on the front line;Chabinsky S. R.;J. Nat'l Sec. L. & Pol'y,2010