These are the sources and citations used to research Problem Statement. This bibliography was generated on Cite This For Me on
In-text: (Clinton, 2015)
Your Bibliography: Clinton, L., 2015. 5 economic principles of cyber security. [online] World Economic Forum. Available at: <https://www.weforum.org/agenda/2015/02/5-economic-principles-of-cyber-security/> [Accessed 8 June 2018].
In-text: (Kovacevic and Nikolic, 2015)
Your Bibliography: Kovacevic, A. and Nikolic, D., 2015. Cyber Attacks on Critical Infrastructure. Advances in Digital Crime, Forensics, and Cyber Terrorism, [online] pp.1-18. Available at: <https://www-igi-global-com.library.capella.edu/gateway/chapter/full-text-pdf/115745> [Accessed 8 June 2018].
In-text: (Lewis, 2006)
Your Bibliography: Lewis, J., 2006. Cybersecurity and Critical Infrastructure Protection. [online] csis.org. Available at: <https://www.csis.org/analysis/cybersecurity-and-critical-infrastructure-protection> [Accessed 8 June 2018].
In-text: (Norgaard Hald and Pedersen, 2014)
Your Bibliography: Norgaard Hald, S. and Pedersen, J., 2014. The Threat of Digital Hacker Sabotage to Critical Infrastructures. Advances in Intelligent Systems and Computing, pp.379-390.
In-text: (Obama, 2013)
Your Bibliography: Obama, B., 2013. Executive Order -- Improving Critical Infrastructure Cybersecurity. [online] whitehouse.gov. Available at: <https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity> [Accessed 8 June 2018].
In-text: (Olsen et al., 2014)
Your Bibliography: Olsen, R., Balachandran, K., Hald, S., Lopez, J., Pedersen, J. and Stevanovic, M., 2014. Telecommunication Networks. Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, pp.67-100.
10,587 students joined last month!