References
- International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012 1 ISSN 2229-5518 Study of Latest Emerging Trends on Cyber Security and its challenges to Society by Ravi Sharma.
- Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole
- A Look back on Cyber Security 2012 by Luis corrons - Panda Labs.
- (IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 04, 2016 | ISSN (online): 2321-0613)-cyber ethics
- (International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 7, Issue 4, April 2018, ISSN: 2278 - 1323) ANALYSIS ON CHALLENGES AND THREATS IN CYBER SECURITY)
- (Integrating cost-benefit analysis into the NIST Cybersecurity Framework via the Gordon-Loeb Model) NIST framework
- International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 - 8958, Volume-9 Issue-1, October 2019-Alex. R. Mathew (Cyber security through block chain)
- Iansiti, Marco, and Karim R. Lakhani. "The truth about block chain." Harvard Business Review 95.1 (2017): pp. 118-127.
- Ashton, K. (2009). That 'Internet of Things' thing. RFID Journal,22, 97-114
- Cyber ethics 4.0 serving humanity with values by Christoph Stuckelberger / Pavan Duggal (Eds.)
- Barton, B.F., Barton, M.S.: User-friendly password methods for computer-mediated information systems. Computer. Secur. 3(3), 186-195 (1984) https://doi.org/10.1016/0167-4048(84)90040-3
- Bishop, M., Klein, D.V.: Improving system security via proactive password checking. Computer. Secur. 14(3), 233-249 (1995) https://doi.org/10.1016/0167-4048(95)00003-Q
- Preprint of the article published in the IET conference proceedings as: Radanliev, P., De Roure, C.D., Nurse, R.C., Nicolescu, R., Huth, M., Cannady, C., Montalvo, R.M., Cannady, S., 2018. Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-things in Industry 4.0, in: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET, London.
- Top steps against cyber(https://www.dell.com/downloads/ca/support/top_10_steps_to_protect_against_cybercrime_dell_en.pdf)
- Article Emerging threats by Norton (https://us.norton.com/internetsecurity-emerging-threats-how-do-zero-day-vulnerabilities-work-30sectech.html)
- History about cyber security by Sentinel one blog (https://www.sentinelone.com/blog/history-of-cyber-security/)