These are the sources and citations used to research References. This bibliography was generated on Cite This For Me on
In-text: (2017)
Your Bibliography: Australian Government: Australian Cyber Security Centre. 2017. [online] Available at: <https://www.acsc.gov.au/publications/ACSC_Threat_Report_2017.pdf> [Accessed 22 May 2018].
In-text: (Muggah and Thompson, 2018)
Your Bibliography: Muggah, R. and Thompson, N., 2018. Brazil's Critical Infrastructure Faces a Growing Risk of Cyberattacks. [online] Council on Foreign Relations. Available at: <https://www.cfr.org/blog/brazils-critical-infrastructure-faces-growing-risk-cyberattacks> [Accessed 16 May 2018].
In-text: (Sasso, 2014)
Your Bibliography: Sasso, B., 2014. NSA Chief Warns Companies Against Revenge Hacking. [online] The Atlantic. Available at: <https://www.theatlantic.com/politics/archive/2014/10/nsa-chief-warns-companies-against-revenge-hacking/456747/> [Accessed 20 May 2018].
In-text: (Sebenius, 2017)
Your Bibliography: Sebenius, A., 2017. Will Ukraine Be Hit by Yet Another Holiday Power-Grid Hack?. [online] The Atlantic. Available at: <https://www.theatlantic.com/technology/archive/2017/12/ukraine-power-grid-hack/548285/> [Accessed 19 May 2018].
In-text: (Tang, 2015)
Your Bibliography: Tang, A., 2015. Hacking Back against Cyber Attacks. [online] Chicago Policy Review. Available at: <http://chicagopolicyreview.org/2015/07/21/hacking-back-against-cyber-attacks/> [Accessed 17 May 2018].
In-text: (What Is Critical Infrastructure?, 2017)
Your Bibliography: U.S. Department of Homeland Security. 2017. What Is Critical Infrastructure?. [online] Available at: <https://www.dhs.gov/what-critical-infrastructure> [Accessed 17 May 2018].
In-text: (Wolff, 2017)
Your Bibliography: Wolff, J., 2017. When Companies Get Hacked, Should They Be Allowed to Hack Back?. [online] The Atlantic. Available at: <https://www.theatlantic.com/business/archive/2017/07/hacking-back-active-defense/533679/> [Accessed 14 May 2018].
In-text: (Yağlı and Dal, 2014)
Your Bibliography: Yağlı, S. and Dal, S., 2014. Defense within the Concept of NATO’s Protection of Critical Infrastructures. International Journal of Computer and Systems Engineering, [online] 8(4). Available at: <https://waset.org/publications/9997871/active-cyber-defense-within-the-concept-of-nato-s-protection-of-critical-infrastructures> [Accessed 22 May 2018].
10,587 students joined last month!