1. von Solms, R. and van Niekerk, J. (2013) From Information Security to Cyber Security. Computers & Security, 38, 97-102.https://profsandhu.com/cs6393_s19/Solms-Niekerk-2013.pdf
2. (2023) What Is Information Security: Policy, Principles & Threats. Imperva.https://www.imperva.com/learn/data-security/information-security-infosec/
3. Rudra, A. (2022) Information Security vs Cyber Security: How Are They Mutually Exclusive? https://powerdmarc.com/information-security-vs-cyber-security/
4. Fadziso, T., Thaduri, U.R., Dekkati, S. and Ballamudi, V.K.R. (2023) Evolution of the Cyber Security Threat: An Overview of the Scale of. https://www.researchgate.net/publication/374156044_Evolution_of_the_Cyber_Security_Threat_An_Overview_of_the_Scale_of_Cyber_Threat
5. Linkov, I. and Kott, A. (2018) Fundamental Concepts of Cyber Resilience: Introduction and Overview. https://www.researchgate.net/publication/325680212_Fundamental_Concepts_of_Cyber_Resilience_Introduction_and_Overview