[
1. AP (June 2, 2021). Getting Back online After Cyberattack. https://www.cnbc.com/2021/06/02/jbs-worlds-largest-meat-producer-getting-back-online-after-cyberattack.html
]Search in Google Scholar
[
2. Cohen-Almagor (April 2011). Internet History. International Journal of Techno ethics. https://ieeexplore.ieee.org/abstract/document/5622061
]Search in Google Scholar
[
3. Jang-Jaccard, J. and Nepal, S. (August 2014). A survey of emerging threats in cybersecurity. Journal of Computer and Systems Sciences, 80, 5, pp. 973–993. https://doi.org/10.1016/j.jcss.2014.02.00510.1016/j.jcss.2014.02.005
]Search in Google Scholar
[
4. Krigman, A. (October 22, 2020). Cyber Autopsy Series: Ukraine Power Grid Attack Makes History. https://www.globalsign.com/en/blog/cyber-autopsy-series-ukranian-power-grid-attack-makes-history
]Search in Google Scholar
[
5. Morgan, S. (November 13, 2020). Cybercrime to Cost the World $10.5 Trillion Annually by 2025. Cybersecurity Ventures. https://cybersecurityventures.com/cybercrime-will-cost-the-world-16-4-billion-a-day-in-2021
]Search in Google Scholar
[
6. Nield, D. (December 10, 2015). Google’s Quantum Computer is 100 million Times Faster Than Your Laptop. Science Alert. https://www.sciencealert.com/google-s-quantum-computer-is-100-million-times-faster-than-your-laptop
]Search in Google Scholar
[
7. Norton (2020). Norton Cyber Security Insights Report: Global Results, Symantec. https://www.nortonlifelock.com/us/en/newsroom/press-kits/2021-norton-cyber-safety-insights-report/
]Search in Google Scholar
[
8. Okereafor, K. and Adelaiye, O. (July 2020). Randomized Cyber Attacks Simulation Model: A Cyber Security Mitigation Proposal for Post Covid-19 Digital Era. International Journal of Recent Engineering Research and Development, 5, 7, pp. 61–72.
]Search in Google Scholar
[
9. Pagliery, J. (August 5, 2015). The Inside Story of the Biggest Hack in History. https://money.cnn.com/2015/08/05/technology/aramco-hack/index.html
]Search in Google Scholar
[
10. Perlroth, N. (June 6, 2021). Are We Waiting for Everyone to Get Hacked? New York Times.
]Search in Google Scholar
[
11. Riley, T. (December 7, 2020). Cybersecurity 202: Global Losses from Cybercrime Skyrocketed to nearly $1 Trillion in 2020. The Washington Post.
]Search in Google Scholar
[
12. Stewart, T. and Strausbaugh, S. (September 26, 2017). The 8 Character Password is Dead. Protiviti, https://tcblog.protiviti.com/2017/09/26/the-8-character-password-is-dead
]Search in Google Scholar
[
13. Turton, W. and Mehrotra, K. (June 4, 2021). Hackers Breach Colonial Pipeline Using Compromised Password. Bloomberg, https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password
]Search in Google Scholar
[
14. So, H.K., Kwok, S.H.M., Lam, E.Y., and Lui, K. (2010). Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid. 2010 First IEEE International Conference on Smart Grid Communications, pp. 321–326. Doi: 10.1109/SMARTGRID.2010.5622061.10.1109/SMARTGRID.2010.5622061
]Search in Google Scholar
[
15. Vailshery, L. (January 22, 2021). Average Number of Devices in the Typical American Home. Statista, https://www.statista.com/statistics/1107206/average-number-of-connected-devices-us-house
]Search in Google Scholar