1. Information technology --- Security techniques --- Information security management systems --- Requirements ISO/IEC 27001:2013: 2013. https://www.iso.org/standard/54534.html. Accessed: 2021-10-13.' Information technology --- Security techniques --- Information security management systems --- Requirements ISO/IEC 27001:2013: 2013. https://www.iso.org/standard/54534.html. Accessed: 2021-10-13.'
2. Information technology --- Security techniques --- Code of practice for information security controls ISO/IEC 27002:2013: 2013. https://www.iso.org/standard/54533.html.Accessed: 2021-10-13. Information technology --- Security techniques --- Code of practice for information security controls ISO/IEC 27002:2013: 2013. https://www.iso.org/standard/54533.html.Accessed: 2021-10-13.
3. Computer and information security at nuclear facilities | IAEA: 2021. https://www.iaea.org/topics/computer-and-information-security. Accessed: 2021-10-13. Computer and information security at nuclear facilities | IAEA: 2021. https://www.iaea.org/topics/computer-and-information-security. Accessed: 2021-10-13.
4. NIST Cybersecurity Framework: 2021. https://www.nist.gov/cyberframework. Accessed: 2021-10-13. NIST Cybersecurity Framework: 2021. https://www.nist.gov/cyberframework. Accessed: 2021-10-13.
5. Integrating Cybersecurity and Enterprise Risk Management (ERM)