Gotowa bibliografia na temat „Cybersecurity risk management”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cybersecurity risk management”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Cybersecurity risk management"
Eaton, Tim V., Jonathan H. Grenier i David Layman. "Accounting and Cybersecurity Risk Management". Current Issues in Auditing 13, nr 2 (1.03.2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.
Pełny tekst źródłaBurrell, Darrell Norman. "Understanding Healthcare Cybersecurity Risk Management Complexity". Land Forces Academy Review 29, nr 1 (28.02.2024): 38–49. http://dx.doi.org/10.2478/raft-2024-0004.
Pełny tekst źródłaBriscoe, Christopher, i Carl Young. "Scale, Complexity, and Cybersecurity Risk Management". Journal of Information Security 15, nr 04 (2024): 524–44. http://dx.doi.org/10.4236/jis.2024.154029.
Pełny tekst źródłaOlawoyin, Olayinka Michael. "Blockchain Technology in Risk Management: Strengthening Cybersecurity and Financial Integrity". International Journal of Research Publication and Reviews 5, nr 10 (październik 2024): 2336–48. http://dx.doi.org/10.55248/gengpi.5.1024.2829.
Pełny tekst źródłaAdebayo Omowunmi Temitope, LawalYusufAdedayo i Braimoh Kareem. "Cybersecurity risk management in agile development: protecting data and system". International Journal of Science and Research Archive 8, nr 1 (28.02.2023): 988–94. http://dx.doi.org/10.30574/ijsra.2023.8.1.0188.
Pełny tekst źródłaKeskin, Omer F., Kevin Matthe Caramancion, Irem Tatar, Owais Raza i Unal Tatar. "Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports". Electronics 10, nr 10 (13.05.2021): 1168. http://dx.doi.org/10.3390/electronics10101168.
Pełny tekst źródłaLi, He, Won Gyun No i Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors". International Journal of Accounting Information Systems 30 (wrzesień 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.
Pełny tekst źródłaChebib, Tom. "Digital Identity: A Human-Centered Risk Awareness Study". Muma Business Review 5 (2021): 031–33. http://dx.doi.org/10.28945/4826.
Pełny tekst źródłaKure, Halima Ibrahim, i Shareeful Islam. "Assets focus risk management framework for critical infrastructure cybersecurity risk management". IET Cyber-Physical Systems: Theory & Applications 4, nr 4 (1.12.2019): 332–40. http://dx.doi.org/10.1049/iet-cps.2018.5079.
Pełny tekst źródłaLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management". Future Internet 12, nr 9 (18.09.2020): 157. http://dx.doi.org/10.3390/fi12090157.
Pełny tekst źródłaRozprawy doktorskie na temat "Cybersecurity risk management"
Rassega, Valter. "Cyber security risk management nei servizi pubblici strategici". Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.
Pełny tekst źródłaThe global digital network, with its ability to communicate directly and in real time between people in every part of the planet, is a formidable tool to develop relationships and realize exchange of information and knowledge. In cyberspace they coexist people of all kinds, characterized by different interests, different cultures and different ways of relating to others. From an economic point of view, the global network has become a formidable transactional tool for the exchange of goods and services and there is the commercial and industrial sector that has not arrived in some way in cyberspace. The cybernetic revolution, induced by new and increasingly powerful electronic and computer technologies, it is not limited to connect the network, almost all of the planet's surface but is rapidly expanding to the direct control of myriad physical devices of the most varied , from Smartphone to wearable devices, from city traffic control to the electricity production and distribution infrastructure systems. And 'the SO-CALLED "Internet of Things" and the Internet of things, the network that interconnects all electronic devices capable of communicating with the outside world. A pervasive who did not spare the public sector which, first, is called on to provide answers on many fronts, not least regulatory, and as far as possible, ensure compliance with the rules in the real world even in cyberspace. In particular, the public sector must take responsibility to ensure the physical and cyber security of SO-CALLED National Critical Infrastructure, including all the essential services for national security, the proper functioning of the country and its economic growth and, not least, the well-being of the population. Are Critical Infrastructures electric and energy system, communication networks in general, networks and transport infrastructure of people and goods (ship, rail, air and road), the public health system, economics and financial channels, the national networks of government , regions, those for emergency management and civil protection. The challenge is complex and Public Administration alone seems unable to respond effectively to increasingly sophisticated cyber-attacks that day, affecting the civilian world, industrial and economic. NCI are not immune and, as a result, the Public Strategic Services are exposed to significant risks. On this issue, Western governments have long established close cooperation with the private sector, and highlighted the need to define a strategy and a shared modus operandi and quality between the various actors involved. This work aims to address systematically the "hot" topic of cyber security, an area that involves national governments, military, intelligence services, the economy and the business world as a whole and, gradually and in various capacities and degree of interest, every single citizen of the world. In this unprecedented scenario, strongly characterized by uncertainty and variability of the virus, the application sic et simpliciter of "traditional" evaluation techniques of the corporate risk derivation is inadequate for this purpose, despite a certain degree of adaptation to the new scenario is already underway. The analysis focuses on the relative adaptive-evolution that is affecting the risk management in the field of cyber security and state of the art in the academic and scientific world views in the introduction of new and more advanced tools for analysis the Cyber Risk. The work ends with a case study of a large Italian company which provides a strategic public service such as electricity. [edited by author]
La rete digitale globale, con la sua capacità di stabilire contatti diretti e in tempo reale tra persone in ogni parte del pianeta, rappresenta uno strumento formidabile per sviluppare relazioni e realizzare scambio di informazioni e di conoscenza. Nel cyberspazio convivono persone di ogni tipo, caratterizzate da interessi diversi, culture differenti e diversi modi di relazionarsi con il prossimo. Dal punto di vista economico, la rete globale è oggi un formidabile strumento transazionale per lo scambio di beni e di servizi e non vi è settore commerciale e industriale che non sia approdato in qualche modo nel cyberspazio. La rivoluzione cibernetica, indotta dalle nuove e sempre più potenti tecnologie elettroniche e informatiche, non si è limitata a connettere in rete la quasi totalità della superficie del pianeta ma si sta rapidamente espandendo verso il controllo diretto di una miriade di dispositivi fisici tra i più vari, dagli Smartphone ai dispositivi indossabili, dai sistemi di controllo del traffico cittadino alle infrastrutture di produzione e distribuzione di energia elettrica. E’ la c.d. “Internet of Things” o Internet delle cose, che interconnette in rete tutti i dispositivi elettronici in grado di comunicare con il mondo esterno. Una pervasività che non ha risparmiato il settore pubblico che, in primo luogo, è chiamato a fornire risposte su numerosi fronti, non ultimo quello normativo, e, per quanto possibile, garantire il rispetto delle regole presenti nel mondo reale anche nello spazio cibernetico. In particolare, il settore pubblico deve farsi carico di garantire la sicurezza fisica e informatica delle c.d. infrastrutture critiche nazionali, che includono tutti quei servizi essenziali per la sicurezza nazionale, il buon funzionamento del Paese e la sua crescita economica e, non ultimo, il benessere della popolazione. Sono Infrastrutture Critiche il sistema elettrico ed energetico, le reti di comunicazione in genere, le reti e le infrastrutture di trasporto di persone e merci (navale, ferroviario, aereo e stradale), il sistema sanitario pubblico, i circuiti economici e finanziari, le reti del Governo nazionale, delle Regioni, quelle per la gestione delle emergenze e della Protezione Civile. La sfida è complessa e la Pubblica Amministrazione da sola non sembra in grado di poter rispondere in modo efficace agli attacchi informatici sempre più sofisticati che, quotidianamente, colpiscono il mondo civile, industriale ed economico. Le infrastrutture critiche nazionali non ne sono immuni e, di conseguenza, i Servizi Pubblici Strategici sono esposti a significativi rischi. Su questo tema, i Governi occidentali hanno da tempo avviato una stretta collaborazione con il settore privato, ed è emersa la necessità di definire una strategia e un modus operandi condiviso e di qualità tra i vari attori coinvolti. Questo lavoro si propone di affrontare in maniera sistematica il tema “caldo” della Cyber Security, un ambito che coinvolge governi nazionali, settori militari, servizi di informazione, il sistema economico e il mondo delle imprese nel suo complesso e, via via e a vario titolo e grado di interesse, ogni singolo cittadino del mondo. In questo scenario inedito, fortemente connotato da incertezza e variabilità delle minacce, l’applicazione sic et simpliciter delle tecniche “tradizionali” di valutazione del rischio di derivazione aziendale risulta inadeguata allo scopo, nonostante un certo grado di adattamento al nuovo scenario sia già in corso. L’analisi si concentra sulla parte relativa all’’evoluzione adattativa’ che sta interessando il risk management nel campo della cyber security e dello stato dell’arte nel panorama accademico e scientifico mondiale nell’introduzione di nuovi e più evoluti strumenti per l’analisi del Cyber Risk. Il lavoro si conclude con un caso di studio effettuato su di una grande azienda italiana che fornisce un servizio pubblico strategico quale l’energia elettrica. [a cura dell'autore]
XV n.s.
Steinbernreiter, Kajsa. ""The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companies". Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22101.
Pełny tekst źródłaBaker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains". Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.
Pełny tekst źródłaPh. D.
Gao, Olivia Qing. "Risk Assessment for IoT : a system evaluation of the smart home and its cybersecurity imperative". Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106247.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 92-107).
In the past two decades, the exponential growth of the modern Internet with the digitization of most human activities such as data gathering and storage have also fueled the growth of cybercrimes. In more recent years, the modern Internet is spreading into everyday life through the Internet of Things (IoT), which is further expanding the attack surface. Among all the IoT domains, the smart home, in particular, is poised to be one of the most exciting application areas of the IoT. However, behind the optimistic outlook, the shadow of an impending threat is also growing. Across the board, among the smart home device manufacturers, security is nearly non-existent or significantly downplayed. Consequently, the neglected, unresolved vulnerabilities in these devices widely expose their users and their family to cyberattacks. This thesis aims to illuminate the dynamics in the smart home market and their implications for IoT as a whole. First, it will review the past evolution of the IoT and the smart home along with current trends in enabling technologies. Next, through detailed examinations of four dynamic factors - i) macro pressures to innovate, 2) growing perils of cybercrimes, 3) vulnerabilities in the smart home, and 4) values at risk - the thesis seeks to elucidate the serious consequences of ignoring cybersecurity in the smart home system through causal loop diagramming. This thesis uses substantiated data from the past few years to justify its analyses. The thesis concludes that the smart home is an essential innovation that can help solve many urgent challenges facing our time, and securing the smart home devices is a key step towards building a safer and more secure IoT future as well as a future for the current generation and many generations to come.
by Olivia Qing Gao.
S.M. in Engineering and Management
Stefanska, Beata, i Fatimah Laura Al-Dawod. "The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management". Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218.
Pełny tekst źródłaArowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.
Pełny tekst źródłaAbu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society". Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.
Pełny tekst źródłaTakacs, Gergely. "Integration of CTI into security management". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Pełny tekst źródłaCurran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements". Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.
Pełny tekst źródłaMOKALLED, HASSAN. "The importance to manage data protection in the right way: Problems and solutions". Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/997252.
Pełny tekst źródłaKsiążki na temat "Cybersecurity risk management"
Rohmeyer, Paul, i Jennifer L. Bayuk. Financial Cybersecurity Risk Management. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4194-3.
Pełny tekst źródłaUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Protecting the homeland from nuclear and radiological threats: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, July 29, 2014. Washington: U.S. Government Publishing Office, 2015.
Znajdź pełny tekst źródłaStepping Through Cybersecurity Risk Management. Wiley & Sons, Limited, John, 2024.
Znajdź pełny tekst źródłaStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Znajdź pełny tekst źródłaStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Znajdź pełny tekst źródłaStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Znajdź pełny tekst źródłaOh, Kok-Boon. Cybersecurity Risk Management: An ERM Approach. Nova Science Publishers, Incorporated, 2021.
Znajdź pełny tekst źródłaOh, Kok-Boon. Cybersecurity Risk Management: An ERM Approach. Nova Science Publishers, Incorporated, 2022.
Znajdź pełny tekst źródłaKissoon, Tara. Optimal Spending on Cybersecurity Measures: Risk Management. Taylor & Francis Group, 2021.
Znajdź pełny tekst źródłaBlokdyk, Gerardus. Cybersecurity Risk Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Znajdź pełny tekst źródłaCzęści książek na temat "Cybersecurity risk management"
Jøsang, Audun. "Cyber Risk Management". W Cybersecurity, 405–28. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_19.
Pełny tekst źródłaRefsdal, Atle, Bjørnar Solhaug i Ketil Stølen. "Cybersecurity". W Cyber-Risk Management, 29–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Pełny tekst źródłaWatters, Paul A. "Risk Management". W Cybercrime and Cybersecurity, 16–27. New York: CRC Press, 2023. http://dx.doi.org/10.1201/9781003406730-2.
Pełny tekst źródłaKissoon, Tara. "Cybersecurity risk-management framework". W Optimal Spending on Cybersecurity Measures, 95–112. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-7.
Pełny tekst źródłaKissoon, Tara. "Cybersecurity Risk Management Framework". W Optimal Spending on Cybersecurity Measures, 127–48. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-6.
Pełny tekst źródłaKissoon, Tara. "Risk-management practice – vulnerability management". W Optimal Spending on Cybersecurity Measures, 26–45. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-4.
Pełny tekst źródłaKaur, Gurdip, i Arash Habibi Lashkari. "Information Technology Risk Management". W Advances in Cybersecurity Management, 269–87. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71381-2_13.
Pełny tekst źródłaKaur, Gurdip, Ziba Habibi Lashkari i Arash Habibi Lashkari. "Cybersecurity Risk in FinTech". W Understanding Cybersecurity Management in FinTech, 103–22. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79915-1_6.
Pełny tekst źródłaKissoon, Tara. "Risk-management practice – business continuity management". W Optimal Spending on Cybersecurity Measures, 68–94. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-6.
Pełny tekst źródłaBillois, Gérôme. "Cybersecurity Incident and Crisis Management". W The Cyber Risk Handbook, 171–84. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch12.
Pełny tekst źródłaStreszczenia konferencji na temat "Cybersecurity risk management"
Marek, James. "Cybersecurity and Risk Management Framework in Avionics". W Vertical Flight Society 74th Annual Forum & Technology Display, 1–10. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Pełny tekst źródłaMann, Zoltán Ádám. "Urgency in Cybersecurity Risk Management: Toward a Solid Theory". W 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 651–64. IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00051.
Pełny tekst źródłaEltaeib, Tarik, Shakour Abuzneid i Khaled Elleithy. "Proposed Framework for a Comprehensive Cybersecurity Risk Management Strategy". W 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 1–6. IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10808119.
Pełny tekst źródłaFarouk, Suleiman, Chandrashekhar Uppin i Gilbert George. "Enhancing Cybersecurity in Nigeria: A Proposed Risk Management Framework for Universities". W 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG), 1–8. IEEE, 2024. http://dx.doi.org/10.1109/seb4sdg60871.2024.10629748.
Pełny tekst źródłaTsai, Joseph, i Marc Dupuis. "Identification and Operationalization of Key Risks and Mitigations for the Cybersecurity Risk Management of Home Users". W 2024 Cyber Awareness and Research Symposium (CARS), 1–9. IEEE, 2024. https://doi.org/10.1109/cars61786.2024.10778868.
Pełny tekst źródłaSalutina, Tatyana Y., Galina P. Platunina i Irina A. Frank. "Cybersecurity, Risk Management and Monitoring of Digital and Infocommunication Development of the Company". W 2024 International Conference on Engineering Management of Communication and Technology (EMCTECH), 1–5. IEEE, 2024. http://dx.doi.org/10.1109/emctech63049.2024.10741653.
Pełny tekst źródłaCurran, Barry, i James Egan. "A Method of Assessing Data Quality in Publicly Available Cybersecurity Data Sources for Use in Medical Device Cybersecurity Risk Management". W 2023 Cyber Research Conference - Ireland (Cyber-RCI), 1–9. IEEE, 2023. http://dx.doi.org/10.1109/cyber-rci59474.2023.10671424.
Pełny tekst źródłaSheh, R., K. Geappen i D. Harriss. "AUTONOMOUS CYBERSECURITY AND AI RISK MANAGEMENT FOR UNCREWED SYSTEMS: CHALLENGES AND OPPORTUNITIES USING THE NIST FRAMEWORKS". W XPONENTIAL 2024, 46–67. Arlington, Virginia, USA: Association for Unmanned Vehicle Systems International, 2024. http://dx.doi.org/10.52202/075106-0003.
Pełny tekst źródłaKatsumata, Peter, Judy Hemenway i Wes Gavins. "Cybersecurity risk management". W MILCOM 2010 - 2010 IEEE Military Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/milcom.2010.5680181.
Pełny tekst źródłaOhrimenco, Serghei, i Valeriu Cernei. "Cybersecurity risk". W Economic Security in the Context of Systemic Transformations, 3rd Edition. Academy of Economic Studies of Moldova, 2024. http://dx.doi.org/10.53486/escst2023.17.
Pełny tekst źródłaRaporty organizacyjne na temat "Cybersecurity risk management"
Quinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte i R. K. Gardner. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, luty 2022. http://dx.doi.org/10.6028/nist.ir.8286b.
Pełny tekst źródłaMcWhite, Rebecca. NIST Cybersecurity Supply Chain Risk Management:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1326.ipd.
Pełny tekst źródłaQuinn, Stephen, Nahla Ivy, Matthew Barrett, Larry Feldman, Greg Witte i R. K. Gardner. Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, listopad 2021. http://dx.doi.org/10.6028/nist.ir.8286a.
Pełny tekst źródłaStine, Kevin, Stephen Quinn, Greg Witte i R. K. Gardner. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, październik 2020. http://dx.doi.org/10.6028/nist.ir.8286.
Pełny tekst źródłaBarker, William C., Karen Scarfone, William Fisher i Murugiah Souppaya. Cybersecurity Framework Profile for Ransomware Risk Management. National Institute of Standards and Technology, wrzesień 2021. http://dx.doi.org/10.6028/nist.ir.8374-draft.
Pełny tekst źródłaQuinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte i R. K. Gardner. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. National Institute of Standards and Technology, styczeń 2022. http://dx.doi.org/10.6028/nist.ir.8286c-draft.
Pełny tekst źródłaQuinn, Stephen. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286c.
Pełny tekst źródłaQuinn, Stephen. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8286c-upd1.
Pełny tekst źródłaStine, Kevin, Stephen Quinn, Nahla Ivy, Larry Feldman, Greg Witte i R. K. Gardner. Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM). National Institute of Standards and Technology, lipiec 2021. http://dx.doi.org/10.6028/nist.ir.8286a-draft2.
Pełny tekst źródłaBoyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.
Pełny tekst źródła