1. 2013. ISO/IEC 27002 Code of practice for information security controls. https://www.iso27001security.com/html/27002.html [accessed on 25/05/2021]. 2013. ISO/IEC 27002 Code of practice for information security controls. https://www.iso27001security.com/html/27002.html [accessed on 25/05/2021].
2. Ioannis Agrafiotis Sadie Creese Michael Goldsmith Jason RC Nurse and David Upton. 2016. The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. (2016). Ioannis Agrafiotis Sadie Creese Michael Goldsmith Jason RC Nurse and David Upton. 2016. The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. (2016).
3. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
4. AuditScripts. 2018. AuditScripts Critical Security Controls. URL: https://www.auditscripts.com/ [accessed on 25/05/2021]. AuditScripts. 2018. AuditScripts Critical Security Controls. URL: https://www.auditscripts.com/ [accessed on 25/05/2021].
5. Analysing cyber-insurance claims to design harm-propagation trees