Cyber Security Cookbook For Practitioner
Cyber Security Cookbook For Practitioner
03, 2019
Abstract—The scope of this paper is to provide the essential What resources are required?
framework to C-suite/Management executives in the case of Risk Management
cyber events. This paper will further analyze the various threat
vectors from the operational perspective and provide the Measuring progress and success
remediation plan during the case of cyber-attacks. The basic security principles of Least Privilege,
Keywords-Component; (CIO; CISO; CFO; Risk
Defense in Depth, and Separation of Duties are
Management) observed. These concepts will drive many of the
security design decisions, just like Confidentiality,
I. GENERAL OVERVIEW Integrity, Availability, and Accountability will inform
the requirements for controls to mitigate specific risks.
Organizations prepare for various types of (Wheeler, 2011, Page 19).
emergencies by developing a disaster recovery plan to
cover flood, fire, earthquakes, and other unforeseen II. ENTERPRISE RISK MANAGEMENT
events that may disrupt their operations. It is important
to protect the organization’s assets against cyber threats Risk Management is defined as “the function of
and having a robust playbook as well. According to determining the proper steps to manage risk, whether it
IBM’s CEO, “Cyber Crime Is the Greatest Threat to be to accept, mitigate, transfer, or avoid the risk”.
Every Company in the World”1. Darkreading.com (Wheeler, 2011, Page 149):
states, “Global cost of cybercrime predicted to hit $6 Accept: A decision to accept the risk
trillion annually by 2021”2.
Avoid: Ceasing (or not engaging in) the
Cybersecurity should be an integral part of activity that is presenting the risk altogether
corporate strategy. As Touhill advises, the Transfer: Shifting responsibility or liability
cybersecurity plan focuses on the following (Touhill & for a risk to another party by contracting
Touhill, 2014, as of Page 97): the corresponding cyber insurance
Where are we now? Mitigate: Limit the exposure in some way
SWOT analysis
What do we have to work with? A. Risk Management and FAIR
Information Risks are identified and managed in accordance
Technology with corporate strategy and the corporation’s risk
Finances appetite (Wheeler, 2011 Chapter 3 as of Page 43). Risk
Personnel management incorporates the following:
Plans Resource Profiling
Where do we want to be? Risk Assessment
Value Risk Evaluation
Risk Management Documentation
Effectiveness
Risk Mitigation
Competencies
Validation
How do we get there?
Monitoring and Audit
What will be done?
Who is responsible for doing it? The Factor Analysis of Information Risk (FAIR)3 is
How will it be done? used as a model for understanding, analyzing and
DOI: 10.21307/ijanmc-2019-063 88
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
quantifying information risk in financial terms and For resource profiling, all resources are identified
builds a foundation for developing a scientific and the level of sensitivity is defined for each. A
approach to information risk management. detailed threat analysis is performed quarterly to
identify exposure and quantify risk and security
controls are defined and implemented. It classifies the
likelihood and consequences associated with each risk
and how that risk could impact the business (See
Tables 1, 2).
89
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
changes within information systems. Application the firm’s premises including the reception and entry
security policies include written procedures with secure checkpoints; ID scanner and other access records;
coding standards to ensure secure development of in- video; physical logs; and garage records. Safety and
house applications. physical security measures are audited periodically by
a renowned firm to check they are implemented and
The following cybersecurity workshops and training
working as expected, and updated or fixed if necessary.
are mandatory for executives and employees:
Workshop 1: Agree on which entities to cover and C. Sytem Development Life Cycle and Change
what information is considered nonpublic, as well as Management
the materiality of transactions that relate to audit trail All information systems, including operational
Workshop 2: Enforce MFA and how to reconstruct systems, systems under development, and systems
an audit trail undergoing modification or upgrade, are in some phase
of a system development life cycle. Requirements
Workshop 3: Clarify the certificate of destruction, definition is a critical part of any system development
and the feasibility of the Retention policy process and begins very early in the life cycle, typically
Workshop 4: Train the staff and monitor for threats in the initiation phase. Security requirements are a
subset of the overall functional and nonfunctional (e.g.,
Workshop 5: Discuss the feasibility of encryption quality, assurance) requirements levied on an
of nonpublic information and test first line of defense information system and are incorporated into the
on Microsoft office format documents. system development life cycle simultaneously with the
functional and nonfunctional requirements. As
A. Policies and Procedures recommended by the NIST4, early integration of
A set of 15 must-have policies complements the information security requirements into the system
company’s cybersecurity best practices and accompany development life cycle is the most cost-effective and
the strategy to enforce its fulfilment. Policies and efficient method for an organization to ensure that its
Procedures are communicated to all employees. protection strategy is implemented.
Additionally, where required, appropriate sections are
distributed to suppliers and contractors. In doing so, With regard to configuration management and
their importance is emphasized. Given that fulfilling control, it is important to document the proposed or
them is compulsory, the firm audits compliance, actual changes to the information system and its
provide continuous oversight, demand accountability, environment of operation and to subsequently
and, where necessary, impose sanctions upon those determine the impact of those proposed or actual
who violate these rules. The list of policies can be changes on the overall security state of the system.
found as an Appendix B. Information systems and the environments in which
those systems operate are typically in a constant state
of change (e.g., upgrading hardware, software, or
B. Safety and Physical Security
firmware; redefining the missions and business
At any Institutions, employees’ safety is a priority. processes of the organization; discovering new threats).
Therefore, counting with the experience of a private Documenting information system changes as part of
security company, specific measures have been taken routine SDLC processes and assessing the potential
to ensure the safety of all employees either when impact those changes may have on the security state of
working on premises (garage included) or when they the system is an essential aspect of continuous
travel for work purposes. monitoring, maintaining the current authorization, and
On the other hand, understanding that cyber-attacks supporting a decision for reauthorization when
can sometimes begin with a physical breach -for appropriate.
instance, when an outsider to surreptitiously gather
fodder for a social engineering scheme or when an D. Continuous monitoring
insider (such as a so-called “bad leaver”) gains access As recommended by the NIST5, a critical aspect of
to a company’s network and wreak havoc, without managing risk to information from the operation and
initially using malware or other clandestine use of information systems involves the continuous
technological means- Institutions should take the monitoring of the security controls employed within or
physical security of facilities into consideration as part inherited by the system. The objective of the
of the Cybersecurity strategy. The physical security in continuous monitoring program is to determine if the
90
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
91
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
Knowing the enemy requires understanding the no malicious intent to a sophisticated, well-funded and
different threat actors, what their motivations and goals resourceful character that presents a much higher risk
are, how they operate and their sophistication levels, all of significant impact.
of which can be used to assess degree of risk. Security
The following table illustrates the types of cyber
experts understand the continuum of threat actors well,
security actors, with references to historical
based on monitoring and analysis of incidents. A
cybersecurity cases for clarity:
variety of actors with different motivations and
objectives are constantly looking for vulnerabilities.
These players range from the “inadvertent actor” with
TABLE III. CYBERSECURITY ACTORS. SOURCES: FORTUNE AND MCAFEE
92
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
The following attack vectors have been considered as classified or sensitive, then specific communications
and a decision tree based on the framework is provided will be formulated to the necessary individual(s) and
below: agencies.
Data Loss The Communications Officer will be responsible for
these communications with oversight from the C-Suite,
Insider Threat CEO, CISO, CFO and CIO. For any other loss of data,
Vendor/Partner Compromise the data recovery, backup and restore will be
performed by Information Technology and business
Compromise of Individual Device will resume as usual.
Phishing
Network/System Breach
DDoS Attack Figure 4. Insider Threat
Ransomware
If it is determined that any compromise was the
result of an insider threat, whether it be a vendor,
employee, consultant or former employee, an official
investigation will be conducted to determine the goals
of the attacker, data loss and entry points on the
Figure 2. Detect and Identify
intrusion. Additionally, the investigation will expand to
When a potential incident is reported, the incident cover any individuals with close relations to the
will be investigated to determine if it is valid based on attacker and identification of additional known
known attack vectors. Once validated, one or more conspirators.
members of the incident response team will collaborate Immediately following the identification of an
to determine and classify the impact using the insider threat, the users account will be disabled based
Consequence Table. The categories of incidents are on IT guidelines. Furthermore, checks will be
insignificant, minor, moderate, major, and extreme. performed to identify any unknown accounts and logs
(See Consequence Table) will be assessed regularly for other suspicious
Each attack vector has the potential to overlap, unauthorized activity.
particularly for data loss or insider threat. One or more
of the following decision trees may be put into action
depending on the circumstances of the breach.
93
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
94
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
95
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
Based on these initial considerations, our developing and implementing the policies or
cybersecurity strategy distinguishes three Areas of guidelines required -in compliance with
Focus: regulations-, and consider cyber insurance for
1) Establishing a governance model for security, the company and the Directors.
including enterprise-wide collaboration, Overseeing the company’s response, especially
the communication strategy in close contact
2) Identifying and protecting critical data and with the General Counsel and the Head of
applications, and Communication.
3) Developing and implementing an effective Overseeing the damage control especially what
response plan. is related to approving the investments and
personnel needs to strengthen the company’s
The details of the Response Plan can be found in defenses.
Section 1 of this Playbook but the Appendix D includes
a comprehensive checklist taken into consideration for Assisting the law enforcement after an incident
the firm’s CEO when evaluating cybersecurity and -if required- in close collaboration with the
taking major decisions before, during and after an General Counsel.
incident. Repairing the company’s reputation with
customers, partners, regulators, media, etc. in
Regarding the CEO responsibilities and according close collaboration with the Director of
to the NIST Framework, “the head of agency (or chief Communication.
executive officer) is the highest-level senior official or
executive within an organization with the overall
B. Chief Financial Officer (CFO)
responsibility to provide information security
protections commensurate with the risk and magnitude As most firms have the proper C-Suite executives
of harm (i.e., impact) to organizational operations and working together in order for a strong collaborative
assets, individuals, other organizations, and the nation effort to respond to any potential issues, the Chief
resulting from unauthorized access, use, disclosure, Financial Officer (CFO) must be aligned for financial
disruption, modification, or destruction of: (i) data. The CFO works closely already with CEO and
information collected or maintained by or on behalf of CISO to understand the value in the data that could be
the agency; and (ii) information systems used or possibly taken from a cybersecurity breach. From a
operated by an agency or by a contractor of an agency financial view, the CFO works directly with technology
or other organization on behalf of an agency. and security to understand the leaks from a breach to
manage potential risks. Majority of hacks including
As additional responsibilities, the following are ransom cyber-attacks have a dollar value tied to them.
considered: The CFO needs to address these type of concerns, plus
Making sure cybersecurity is part of the the costs of remediating the attack with appropriate
company’s strategy and operational planning, amount of resources, risk mitigation activities, software
upgrades, and patches. The CFO works with General
the board discussion and the company’s daily
Counsel, Legal, and Director of Communications to
routine. This involves transforming the
analyze the financial impact of the current hack and
company culture, providing the necessary potential future hacks to understand the deep dive
resources in terms of security systems and financial matters.
security trained personnel, and taking into
account lessons learnt from previous incidents The CFO works directly with the CEO to discuss
(if any) to improve its security posture. briefing matters on financials budgets associated with
Creating a Security Committee lead by the cyber-attacks. Each attack a company encounters needs
CISO and which consists on the members of to be justified to provide the correct amount of costs for
man-hours for a patch, and software upgrades to
the C-suite (CEO, CISO, CFO, COO/CIO,
internal systems to build preventive measures within an
Head of Legal/Head of Communication). This organization. The CFO is responsible for
committee is in charge of protecting the recommending a budget with C-Suite executives on an
privacy of corporate and customer data on the annual 3-year rolling forecast to factor in maintenance
network and it from intruders, defining the of upgrades to all internal and external systems that
company’s risk posture, engaging 3rd party for could possibly be faced with any type of cyber threats.
hidden vulnerabilities or active compromises,
96
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
An approved allocated budget from the C-Suite a) Apply security patches to vulnerable or
executives allows CTO and CISO to work with affected infrastructure components
external consulting providers to recommend equipment
upgrades instead of fulfilling the requirements of b) Isolate/turn off infrastructure components
hacker if a ransom was requested. It’s worth c) Deploy teams to investigate or remediate issue
remembering that when a company pays a ransom once,
it will flood the gates with additional hackers in the 2) Recovery:
foreseeable future to attack our organization for a quick a) Business recovery (BR) e.g. repair affected
payment instead of the organization getting application, databases and systems
cybersecurity expert law enforcement involved. Plus,
this type of preventive measure keeps senior b) Activate business continuity (BC) plans
management in the loop to keep on investing more in c) Activate disaster recovery and service
security space of our organization by increasing annual continuity (DR/SCM) plans
budget to build workshops for firm awareness and risk
mitigation. Business continuity and recovery components to be
addressed during and after a cyber-attack:
Budget: For 2017, the total is $650,000 for
consulting and professional services for gap
assessments for the year, which will allow 3) Adherence to legal, regulatory and governance
senior management to focus on meeting requirements: refer to the Crisis
requirements for 2018. Management section of the firm’s Governance
Policy. The aim is to operate within the governance and
Budget: For 2018, the total is regulatory framework even in the event of a crisis.
$14,800,000 with CAPEX and OPEX for
GTS/AME accounting for nearly The objective is to guard against operational havoc
$7,000,000. by:
C. Chief Information Officer and Chief Operations Collaborate with authorities – SEC, FBI &
Officer (CIOO) NSA.
Due to our complete reliance on technology to Address external risks – partner/supplier
conduct business, the board may decide to combine the relationships and communications
roles of CIO and COO into one: the CIOO. The Global Context – political, economic and
combined role yields pronounced efficiencies/benefits social changes and events
in as far as cybersecurity is concerned, more so during
and after attacks. VII. SYSTEMS CLASSIFICATION
To formulate appropriate responses and
VI. SCOPE communications during a cyber-attack, the CIOO and
It is understood that protection against and detection their delegate would consult with the Applications and
of cyber-attacks is the responsibility of the CISO. Systems Registry which contains, in addition to
business and technical information, the appropriate
The CIOO partners with the CISO in formulating RACI diagram. It should be used as the backdrop
and executing remediation. The CIOO is equally against which action is taken (see figure below).
responsible for:
1) Responding:
97
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
clients, etc.
3) Confidential Supervisory Information
such communications from the SEC and
other regulatory bodies.
Attacks impacting systems housing any of the
above three types of data are high risk by nature. The
default severity of any such attack is Major until it is Participation levels are described as follows:
downgraded.
100% :
B. Cybersecurity Events & Change Management Cancel all personal commitments for
Since remediation and recovery entail changing 72 hours
components in the ecosystem and infrastructure, the
CIO has put in place the following processes: Physically on-site in nearest
offices for 72 hours OR if remote,
1) Emergency Change Management – Extreme and via phone and email with access
Major events justify the activation of these processes to appropriate dashboards and/or
where signed pre-approvals are deposited by: metrics.
a) Business Application Owners 75% :
b) Business Unit Leaders Cancel all personal commitments for
48 hours
c) The BoD – subject to final sign-off based on
the scope of action where there is: Physically on-site in nearest offices
for the first 24 hours OR if remote,
A need to communicate externally via phone and email with access to
A legal liability appropriate dashboards and/or
Financial risk metrics.
2) Expedited Change Management – Moderate 50% :
events warrant a scaled down change process where:
Keep personal commitments but
a) Pre-approved Damage Control (limited refrain from alcohol
isolation of components/apps)
Maintain unfettered access to phone
b) Fast-track change management - convening and email communication
skeleton meetings within pre-approved timeframes
98
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
8
Please note that a similar model applies to the rest of
the members of the C-Suite.
D. Chief Information Security Officer (CISO)
Change is inevitable in every industry. But in
finance, the pace of change is driven by regulatory flux,
ever changing geopolitical landscape and the constant
evolution of technology. Today’s financial
organizations face an unprecedented array of new
challenges in the form of cyber-attacks. According to
Cisco, “Playbook is perspective collection of
repeatable queries against security event data sources
that lead to incident detection and response”. Cyber
threats are dynamic in nature so it is important for the Figure 13. Preparation–Before event
CISO’s to have essential planning and communication
skills while protecting shareholder value.
99
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
100
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
The DFS Cyber Law remediation plan is heavily shareholders. These types of breaches have in the past
focused on proper governance requirements to meet caused many issues by not focusing efforts on
Federal Requirements by FINRA. As the need for communication and keeping shareholders and
proper preventive methods, C-Suite Executives turn to stakeholders in the loop.
Legal Counsel to build property strategies to
implement a strong cyber security infrastructure that 1) Internal Communication
resembles all divisions of the company from Front to Internal communications address two groups that
Back office. This includes a program to design a risk will include the employees as well as any business
based approach with policies to address key elements partners. Effective internal communications will
reviewed by the General Counsel and CISO to oversee mitigate the need of panic by individuals and
the program. organizations who are working in the company or with
The General Counsel will need to translate Federal the company. If employees or business partners panic
Requirements to build a variety of tools with alignment and make consequential decisions based on incomplete
from all areas of the organization. These types of information they could cause much more harm than the
technical implementations include Multi-Factor attack itself. An effective communication plan will
Authentication to network access, encryption to protect allow for smooth flow of information at the time of
information, and breach notification to notify the DFS crisis so attention can be given to the more pressing
within 72 hours of a cyber-attack. With the new issue of how to stop the attack and not with its
mandates being consistently brought up in the media, it secondary effects.
is aggressive timeline to implement these requirements Managing the internal communication between
based on the increase amount of threats within cyber- employees and C-Suite is a fundamental need quickly
attacks. Information Technology stakeholders globally as a response. This keeps employees in the loop and
such as ITEC and GTS will help with the execution and aware not to communicate outside of the organization
regulatory requirements such as GDPR outline exactly that could reflect negatively within the media. Right
what is needed to be followed for US regulations. away as soon as the attack occurs and management is
notified, all employees will receive an email from
2) Guidelines for Compliance Human Resources. This information will report that a
Purpose: Law requires banks regulated by DFS to breach has occurred and further information will be
establish and Maintain Cyber Security Program made available as soon as possible. Also, all internal
emails by non-members of the internal team
investigating the incident should cease because
• Section 1: Compliance by August 28, 2017
speculation could cause unnecessary panic. There will
such as CS program, policies, and CISO be a request to not use social media at this time and
• Section 2: Compliance by March 1, 2018 such listing the consequences of misinformation can cause.
as MFA, Training and Risk Assessment All Information Technology senior management will
receive a separate protocol which depending on the
• Section 3: Compliance by September 2, specifics of the attack will notify how their department
2018 such as Audit Trail, Data Encryption will be responding to the attack. The CISO here will be
and Monitoring the main supervisor in charge of all necessary changes
• Section 4: Compliance by March 1, 2019 such that need to be made to any information systems.
as Third-Party Security Program Other banks and broker-dealers our firm does
business with should be notified in a proper response
B. Director of Internal and External Communication method in order to protect business with our partners. If
The main responsibility of the Director of Internal the company has any legal obligations to inform of an
and External Communication in a cybersecurity breach attack in a specified amount of time as is the case with
is to keep the public aware of any risk mitigation issues the GDPR regulations on breach notification, let the
and a strong response to the media that we as C-Suite entity know of the attack, whether it be for compliance,
level employees are ensuring best practices to safely insurance, or CIRT. Let any business partners know
protect the data of our customers. In this day and age, it how any vulnerabilities to their information, so they
is very crucial to develop relationships outside the can begin any incident response plans to help keep
organization with correct media outlets to release their business from being affected by the attack.
significant details while gaining the trust of our
101
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
102
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
103
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
TABLE VIII. APPENDIX D. CHECKLIST FOR CEO(EXECUTIVES IN [4] Fry, E. (2014, June 12). The 6 worst kinds of computer hackers.
GENERAL) Retrieved August 05, 2017, from http://fortune.com/2013/02/26/the-
6-worst-kinds-of-computer-hackers/
[5] M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved
August 05, 2017, from
https://securingtomorrow.mcafee.com/consumer/family-safety/7-
types-of-hacker-motivations/
[6] Enterprise Risk Management Consequence and Likelihood Tables.
(n.d.). Retrieved August 6, 2017, from
https://ppl.app.uq.edu.au/sites/default/files/Risk%20Consequence%20
and%20Likelihood %20Table%20-%20Form.pdf
[7] Touhill, Gregory J., and C. Joseph Touhill. Cybersecurity for
Executives, Wiley, 2014. ProQuest Ebook Central,
https://ebookcentral.proquest.com/lib/columbia/detail.action?docID=
1707094.
[8] Wheeler, E. (2011), Security Risk Management, Chapter 8, Risk
Evaluation and Mitigation Strategies, Elsevier Inc.
[9] Institute, F. (n.d.). FAIR, an international standard by the Open Group.
Retrieved August 08, 2017, from http://www.fairinstitute.org/an-
international-standard
[10] Deinert, A. (2016), “Cybersecurity Breach Playbook: What Every IT
Administrator Needs to Know”, Vantage Point Solutions, Mitchell,
SD
[11] Framework for Improving Critical Infrastructure Cybersecurity. (n.d.).
Retrieved August 8, 2017, from
[12] https://www.bing.com/cr?IG=46B942FD8FD04ED7A2EF4DE7E061
BAE0&CID=18B347
4BBA4361240BCE4D93BB45607D&rd=1&h=qHbOGImxzOpDg5E
TABLE IX. ONE EVENT FOLLOWED BY ANOTHER 54Eh7p9I1gen0wVX Vy1g-
wVCQk6w&v=1&r=https%3a%2f%2fptop.only.wip.la%3a443%2fhttps%2fwww.nist.gov%2fdocument-
3766&p=DevEx,5063.1
[13] Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017,
February 19). Computer Security Incident Handling Guide. Retrieved
August 08, 2017, from https://www.nist.gov/publications/computer-
security-incident-handling-guide
[14] Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017,
February 19). Computer Security Incident Handling Guide. Retrieved
August 08, 2017, from https://www.nist.gov/publications/computer-
security-incident-handling-guide
[15] NIST. (2014, February 12) Retrieved from
https://www.nist.gov/sites/default/files/documents/cyberframework/c
ybersecurity-framework-021214.pdf
[16] Scholtz, T., McMillan, R. (2017, January 26). Institute Cybersecurity
and Risk Governance Practices to Improve Information Security.
Gartner.
[17] Kark, K., Francois, M., Aguas, T. (2016, July 25). The new CISO:
Leading the strategic security organization. (n.d.). Retrieved August
09, 2017, from https://dupress.deloitte.com/dup-us-en/deloitte-
review/issue-19/ciso-next-generation-strategic-security-
organization.html
[18] Fry, E. (2014, June 12). The 6 worst kinds of computer hackers.
REFERENCES Retrieved August 09, 2017, from http://fortune.com/2013/02/26/the-
[1] Morgan, S. (2015, November 24). IBM's CEO On Hackers: 'Cyber 6-worst-kinds-of-computer-hackers/
Crime Is The Greatest Threat To Every Company In The World'. [19] M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved
Retrieved August 05, 2017, from August 09, 2017, from
https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on- https://securingtomorrow.mcafee.com/consumer/family-safety/7-
hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the- types-of-hacker-motivations/
world/#75f85d3973f0
[20] https://www.us-cert.gov/sites/default/files/publications/DHS-
[2] Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By Cybersecurity-Questions-for-CEOs.pdf
2021, Study Says. (2016, August 16). Retrieved August 05, 2017,
from http://www.darkreading.com/attacks-breaches/global-cost-of- [21] https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-
cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study- hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-
says/d/d-id/1326742 world/#bfb909373f07
[3] Cybersecurity Questions for CEOs. (n.d.). Retrieved August 5, 2017, [22] http://www.darkreading.com/attacks-breaches/global-cost-of-
from https://www.us-cert.gov/sites/default/files/publications/DHS- cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-
Cybersecurity-Questions-for-CEOs.pdf says/d/d-id/1326742
104
International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019
[23] G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August
Lipschitz-Hankel type involving products of Bessel functions,” Phil. 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. [29] M. Young, The Technical Writer’s Handbook. Mill Valley, CA:
(references) University Science, 1989.
[24] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., [30] Electronic Publication: Digital Object Identifiers (DOIs):
vol. 2. Oxford: Clarendon, 1892, pp.68–73.
Article in a journal:
[25] I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange
[31] D. Kornack and P. Rakic, “Cell Proliferation without Neurogenesis in
anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds.
Adult Primate Neocortex,” Science, vol. 294, Dec. 2001, pp. 2127-
New York: Academic, 1963, pp. 271–350.
2130, doi:10.1126/science.1065467.
[26] K. Elissa, “Title of paper if known,” unpublished.
Article in a conference proceedings:
[27] R. Nicole, “Title of paper with only first word capitalized,” J. Name
[32] H. Goto, Y. Hasegawa, and M. Tanaka, “Efficient Scheduling
Stand. Abbrev., in press.
Focusing on the Duality of MPL Representatives,” Proc. IEEE Symp.
[28] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec.
spectroscopy studies on magneto-optical media and plastic substrate 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670.
105