REFERENCES
- [1] Cyber Security Breaches Survey 2018: Statistical Release, 2018.
- [2] “What is cyber security? what you need to know.” [Online]. Available: https://us.norton.com/internetsecurity- malware- what- is- cybersecurity-what- you- need- to- know.html
- [3] L. Burton, “Digital life after brexit,” ITNOW, vol. 59, no. 1, pp. 46–47,March 2017.
- [4] K. N. Sevis and E. Seker, “Cyber warfare: terms, issues, laws andcontroversies,” in Cyber Security And Protection Of Digital Services (Cyber Security), 2016 International Conference On. IEEE, 2016, pp. 1–9.
- [5] K. Thakur, M. L. Ali, S. Kopecky, A. Kamruzzaman, and L. Tao, “Connectivity, traffic flow and applied statistics in cyber security,” inSmartCloud(SmartCloud),IEEEInternationalConferenceon. IEEE, 2016, pp. 295–300.
- [6] R. Koch and M. Golling, “The cyber decade: Cyber defence at a x- ing point,” in 2018 10th International Conference on Cyber Conflict (CyCon). IEEE, 2018, pp. 159–186.
[7] “Stoke-on-trent pottery firm targeted in cyber attack,” Dec 2018. [Online]. Available: https : / / www. bbc . co . uk / news / uk – england-stoke-staffordshire-46622375?intlink from url=https://www. bbc.co.uk/news/topics/cp3mvpdp1r2t/cyber-attacks&link location= live- reporting- story
[8] J. Research, “Cybercrime will cost businesses over $2 trillion by 2019,” 2015.
[9] A. Khatua and A. Khatua, “Leave or remain? deciphering brexit deliberations on twitter,” in Data Mining Workshops (ICDMW), 2016 IEEE 16th International Conference on. IEEE, 2016, pp. 428–433.
[10] “Uk cybersecurity and brexit,” Jan 2019. [Online]. Available: http://ukandeu.ac.uk/uk- cybersecurity- and- brexit/
[11] D. Winder, “Post-brexit britain could be a cybersecurity nightmare with or without adeal,” Oct 2018. [Online]. Available: https://www. forbes.com/sites/daveywinder/2018/10/16/post- brexit- britain- could- be- a- cybersecurity- nightmare- with- or- without- a- deal/#3ee8048b2a34
[12] A. K. Roy, “Role of cyber law and its usefulness in indian it industry,” in Recent Advances in Information Technology (RAIT), 2012 1st International Conference on. IEEE, 2012, pp. 143–147.
[13] UK Cybersecurity law, 2017. [Online]. Available: https://www. thedigitalwatcher.com/uk- cybersecurity- law/
[14] 10 Steps to Cyber Security, Aug 2016. [Online]. Available: https://www.ncsc.gov.uk/content/files/protected files/guidance files/ NCSC10StepsToCyberSecurityNCSC.pdf
[15]
[16] What you can do to combat cyber attacks. [Online]. Available:
https : / / www. ncsc . gov. uk / content / files / protected files / guidance files /
NCSCCyberAttacks.pdf
[17] “Homepage,” Sep 2017. [Online]. Available: https : / / www.
cyberessentials.ncsc.gov.uk/
[18] Digital, “Cyber essentials scheme: overview,” Jan 2018.
[Online]. Available: https://www.gov.uk/government/publications/
cyber- essentials- scheme- overview
[19] “Why the uk is investing 1.9bn in cyber security.” [Online].
Available: https://www.newstatesman.com/spotlight/cyber/2018/05/
why- uk- investing- 19bn- cyber- security
[20] Digital, “Secure by design,” Oct 2018. [Online]. Available:
https://www.gov.uk/government/publications/secure- by- design
[21] The UK Cyber Security Strategy, Dec 2014. [Online]. Avail- able: https : / / assets . publishing . service . gov. uk / government / uploads /
system/uploads/attachment data/file/386093/The UK Cyber Security Strategy Report on Progress and Forward Plans – De .pdf