Uncategorized

References for Brexit Impact on Cyber Security of United Kingdom

Spread the love

REFERENCES



  1. [1]  Cyber Security Breaches Survey 2018: Statistical Release, 2018.
  2. [2]  “What is cyber security? what you need to know.” [Online]. Available: https://us.norton.com/internetsecurity- malware- what- is- cybersecurity-what- you- need- to- know.html
  3. [3]  L. Burton, “Digital life after brexit,” ITNOW, vol. 59, no. 1, pp. 46–47,March 2017.
  4. [4]  K. N. Sevis and E. Seker, “Cyber warfare: terms, issues, laws andcontroversies,” in Cyber Security And Protection Of Digital Services (Cyber Security), 2016 International Conference On. IEEE, 2016, pp. 1–9.
  5. [5]  K. Thakur, M. L. Ali, S. Kopecky, A. Kamruzzaman, and L. Tao, “Connectivity, traffic flow and applied statistics in cyber security,” inSmartCloud(SmartCloud),IEEEInternationalConferenceon. IEEE, 2016, pp. 295–300.
  6. [6]  R. Koch and M. Golling, “The cyber decade: Cyber defence at a x- ing point,” in 2018 10th International Conference on Cyber Conflict (CyCon). IEEE, 2018, pp. 159–186.

[7] “Stoke-on-trent pottery firm targeted in cyber attack,” Dec 2018. [Online]. Available: https : / / www. bbc . co . uk / news / uk – england-stoke-staffordshire-46622375?intlink from url=https://www. bbc.co.uk/news/topics/cp3mvpdp1r2t/cyber-attacks&link location= live- reporting- story

[8] J. Research, “Cybercrime will cost businesses over $2 trillion by 2019,” 2015.

[9] A. Khatua and A. Khatua, “Leave or remain? deciphering brexit deliberations on twitter,” in Data Mining Workshops (ICDMW), 2016 IEEE 16th International Conference on. IEEE, 2016, pp. 428–433.

[10] “Uk cybersecurity and brexit,” Jan 2019. [Online]. Available: http://ukandeu.ac.uk/uk- cybersecurity- and- brexit/

[11] D. Winder, “Post-brexit britain could be a cybersecurity nightmare with or without adeal,” Oct 2018. [Online]. Available: https://www. forbes.com/sites/daveywinder/2018/10/16/post- brexit- britain- could- be- a- cybersecurity- nightmare- with- or- without- a- deal/#3ee8048b2a34

[12] A. K. Roy, “Role of cyber law and its usefulness in indian it industry,” in Recent Advances in Information Technology (RAIT), 2012 1st International Conference on. IEEE, 2012, pp. 143–147.

[13] UK Cybersecurity law, 2017. [Online]. Available: https://www. thedigitalwatcher.com/uk- cybersecurity- law/

[14] 10 Steps to Cyber Security, Aug 2016. [Online]. Available: https://www.ncsc.gov.uk/content/files/protected files/guidance files/ NCSC10StepsToCyberSecurityNCSC.pdf

[15]
[16] What you can do to combat cyber attacks. [Online]. Available:

https : / / www. ncsc . gov. uk / content / files / protected files / guidance files /

NCSCCyberAttacks.pdf
[17] “Homepage,” Sep 2017. [Online]. Available: https : / / www.

cyberessentials.ncsc.gov.uk/
[18] Digital, “Cyber essentials scheme: overview,” Jan 2018.

[Online]. Available: https://www.gov.uk/government/publications/

cyber- essentials- scheme- overview
[19] “Why the uk is investing 1.9bn in cyber security.” [Online].

Available: https://www.newstatesman.com/spotlight/cyber/2018/05/

why- uk- investing- 19bn- cyber- security
[20] Digital, “Secure by design,” Oct 2018. [Online]. Available:

https://www.gov.uk/government/publications/secure- by- design
[21] The UK Cyber Security Strategy, Dec 2014. [Online]. Avail- able: https : / / assets . publishing . service . gov. uk / government / uploads /

system/uploads/attachment data/file/386093/The UK Cyber Security Strategy Report on Progress and Forward Plans – De .pdf

What is your reaction?

Excited
0
Happy
0
In Love
0
Not Sure
0
Silly
0
Muntaha Saleem
She is an Editor-in-Chief . She is a Telecom engineer and a blogger. She loves to blog about latest technology news and products.

You may also like

Leave a reply

Your email address will not be published. Required fields are marked *