These are the sources and citations used to research FMC Final. This bibliography was generated on Cite This For Me on

  • Website

    IEC/ISO 27001 - Information Security Management - ISMS | BSI Group | BSI Group

    2017

    In-text: (Bsigroup.com, 2017)

    Your Bibliography: Bsigroup.com. (2017). IEC/ISO 27001 - Information Security Management - ISMS | BSI Group | BSI Group. [online] Available at: https://www.bsigroup.com/en-GB/iso-27001-information-security/ [Accessed 11 Dec. 2017].

  • Journal

    Caldwell, T.

    The true cost of being hacked

    2014 - Computer Fraud & Security

    In-text: (Caldwell, 2014)

    Your Bibliography: Caldwell, T. (2014). The true cost of being hacked. Computer Fraud & Security, 2014(6), pp.8-13.

  • Journal

    Cook, A., Janicke, H., Smith, R. and Maglaras, L.

    The industrial control system cyber defence triage process

    2017 - Computers & Security

    In-text: (Cook et al., 2017)

    Your Bibliography: Cook, A., Janicke, H., Smith, R. and Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers & Security, 70, pp.467-481.

  • Govt. publication

    Department for Digital, Culture, Media & Sport

    Cyber Security Breaches Survey 2017

    2017 - Gov.uk

    In-text: (Department for Digital, Culture, Media & Sport, 2017)

    Your Bibliography: Department for Digital, Culture, Media & Sport (2017). Cyber Security Breaches Survey 2017. Gov.uk.

  • Journal

    DeSmit, Z., Elhabashy, A. E., Wells, L. J. and Camelio, J. A.

    An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems

    2017 - Journal of Manufacturing Systems

    In-text: (DeSmit et al., 2017)

    Your Bibliography: DeSmit, Z., Elhabashy, A., Wells, L. and Camelio, J. (2017). An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems. Journal of Manufacturing Systems, 43, pp.339-351.

  • Govt. publication

    Development, Concepts and Doctrine Centre, MOD

    Cyber Primer

    2016 - MOD

    An operating environment consisting of the interdependent network of digital technology infrastructures, and the data therein spanning the physical, virtual and cognitive domains.

    In-text: (Development, Concepts and Doctrine Centre, MOD, 2016)

    Your Bibliography: Development, Concepts and Doctrine Centre, MOD (2016). Cyber Primer. MOD, p.1.

  • Website

    Cyber Primer

    2016 - MOD

    In-text: (Development, Concepts and Doctrine Centre, 2016)

    Your Bibliography: Development, Concepts and Doctrine Centre. (2016). Cyber Primer. [online] Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/549291/20160720-Cyber_Primer_ed_2_secured.pdf [Accessed 22 Oct. 2017].

  • Website

    Gray, P.

    Risky Business #481 -- Inside the Anthem breach with someone who was there - Risky Business

    2017

    In-text: (Gray, 2017)

    Your Bibliography: Gray, P. (2017). Risky Business #481 -- Inside the Anthem breach with someone who was there - Risky Business. [online] Risky.biz. Available at: https://risky.biz/RB481/ [Accessed 22 Dec. 2017].

  • Journal

    Helbing, D.

    Societal, Economic, Ethical and Legal Challenges of the Digital Revolution: From Big Data to Deep Learning, Artificial Intelligence, and Manipulative Technologies

    2015 - SSRN Electronic Journal

    In-text: (Helbing, 2015)

    Your Bibliography: Helbing, D. (2015). Societal, Economic, Ethical and Legal Challenges of the Digital Revolution: From Big Data to Deep Learning, Artificial Intelligence, and Manipulative Technologies. SSRN Electronic Journal.

  • Journal

    Igure, V. M., Laughter, S. A. and Williams, R. D.

    Security issues in SCADA networks

    2006 - Computers & Security

    In-text: (Igure, Laughter and Williams, 2006)

    Your Bibliography: Igure, V., Laughter, S. and Williams, R. (2006). Security issues in SCADA networks. Computers & Security, 25(7), pp.498-506.

  • Website

    Guidance - NCSC Site

    2017

    In-text: (Ncsc.gov.uk, 2017)

    Your Bibliography: Ncsc.gov.uk. (2017). Guidance - NCSC Site. [online] Available at: https://www.ncsc.gov.uk/guidance [Accessed 11 Dec. 2017].

  • Website

    Whaling: how it works, and what your organisation can do about it - NCSC Site

    2017

    In-text: (Ncsc.gov.uk, 2017)

    Your Bibliography: Ncsc.gov.uk. (2017). Whaling: how it works, and what your organisation can do about it - NCSC Site. [online] Available at: https://www.ncsc.gov.uk/guidance/whaling-how-it-works-and-what-your-organisation-can-do-about-it [Accessed 22 Dec. 2017].

  • Website

    10 Steps: A Board Level Responsibility - NCSC Site

    2016

    In-text: (Ncsc.gov.uk, 2016)

    Your Bibliography: Ncsc.gov.uk. (2016). 10 Steps: A Board Level Responsibility - NCSC Site. [online] Available at: https://www.ncsc.gov.uk/guidance/10-steps-board-level-responsibility [Accessed 11 Dec. 2017].

  • Newspaper

    Pilkington, E.

    Justine Sacco, PR executive fired over racist tweet, 'ashamed'

    2013 - The Guardian

    In-text: (Pilkington, 2013)

    Your Bibliography: Pilkington, E. (2013). Justine Sacco, PR executive fired over racist tweet, 'ashamed'. The Guardian. [online] Available at: https://www.theguardian.com/world/2013/dec/22/pr-exec-fired-racist-tweet-aids-africa-apology [Accessed 28 Nov. 2017].

  • Website

    Swiss Life Group

    Board of Directors

    2017 - Swiss Life Group

    In-text: (Swiss Life Group, 2017)

    Your Bibliography: Swiss Life Group (2017). Board of Directors. [online] Swiss Life Group. Available at: https://www.swisslife.com/en/swisslifegroup/management/board.html [Accessed 22 Dec. 2017].

  • Report

    Thales

    Cyber Security for SCADA Systems

    2013

    In-text: (Thales, 2013)

    Your Bibliography: Thales (2013). Cyber Security for SCADA Systems. [online] pp.1-16. Available at: https://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwiZ9vK9vpHXAhVB1RoKHdsMCWMQFgg5MAE&url=https%3A%2F%2Fwww.thalesgroup.com%2Fsites%2Fdefault%2Ffiles%2Fasset%2Fdocument%2Fthales-cyber-security-for-scada-systems.pdf&usg=AOvVaw2e-gxoi9KdEjMyNktwm0z- [Accessed 27 Oct. 2017].

  • Journal

    Wells, L. J., Camelio, J. A., Williams, C. B. and White, J.

    Cyber-physical security challenges in manufacturing systems

    2014 - Manufacturing Letters

    In-text: (Wells et al., 2014)

    Your Bibliography: Wells, L., Camelio, J., Williams, C. and White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), pp.74-77.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join