Cyber Security Management
VerifiedAdded on 2023/06/04
|14
|2652
|374
AI Summary
This report provides proposals on how to improve cyber security at BK, including malware-software prevention mechanism, deployment of cryptographic techniques, peer-to-peer network, DSL alternative, and cyber security behaviors. It also discusses the cost design and budget of cyber security and the importance of protecting computer systems from unauthorized access.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: CYBER SECURITY MANAGEMENT1
Cyber Security Management
Student’s Name:
Professor’s Name:
Course:
Institution Affiliation:
Date of Submission:
Cyber Security Management
Student’s Name:
Professor’s Name:
Course:
Institution Affiliation:
Date of Submission:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CYBER SECURITY MANAGEMENT 2
TABLE OF CONTENTS
BK accounting background…………………………………………………………………….4
Proposal 1: malware-software prevention mechanism………………………………………..4
Proposal 2: deployment of cryptographic techniques…………………………………………6
Proposal 3: peer-to-peer network……………………………………………………………….8
Proposal 4: DSL alternative……………………………………………………………………..9
Proposal 5: cyber security behaviors………………………………………………………….10
Cost Design and Budget………………………………………………………………………..11
Summary………………………………………………………………………………………...12
REFERENCES………………………………………………………………………………….13
TABLE OF CONTENTS
BK accounting background…………………………………………………………………….4
Proposal 1: malware-software prevention mechanism………………………………………..4
Proposal 2: deployment of cryptographic techniques…………………………………………6
Proposal 3: peer-to-peer network……………………………………………………………….8
Proposal 4: DSL alternative……………………………………………………………………..9
Proposal 5: cyber security behaviors………………………………………………………….10
Cost Design and Budget………………………………………………………………………..11
Summary………………………………………………………………………………………...12
REFERENCES………………………………………………………………………………….13
CYBER SECURITY MANAGEMENT 3
TABLE OF FIGURES
Figure 1 Diagram illustrating how malware software is prevented using firewall………..6
Figure 2 Diagram illustrating data encryption………………………………………………8
Figure 3 DSL cable diagram connection………………………………………………………10
TABLE OF FIGURES
Figure 1 Diagram illustrating how malware software is prevented using firewall………..6
Figure 2 Diagram illustrating data encryption………………………………………………8
Figure 3 DSL cable diagram connection………………………………………………………10
CYBER SECURITY MANAGEMENT 4
BK and cyber-security
Cyber security is defined as the attempt to make one’s computer device from unauthorized
access. In the modern world, computer technology is mushrooming. Computer systems have an
abundance of applications in every sector. The knowledge about computer systems has a wide
variety of applications. From communication by the use of internet to military strategies.
Industrialization and also businesses have benefited a lot from computer technology. It is
therefore very important to ensure one’s computer is secure
Enterprises, organizations and businesses are responsible to ensure all their computer systems are
secure. Such setups have very sensitive information. Malicious people may get access to this
information and bring a lot of harm to the company. Computers can be vulnerable to malicious
people through malicious programs. The first malicious program was developed in 1978. This
was the first step that led to more harmful malicious softwares over time. Viruses, Trojans,
malwares, adwares, worms and ransomwares are some of the most common malicious sofwares
that can easily compromise the security of a computer system.
The stakeholders at BK clearly don’t understand the importance of cyber security. There were
many loopholes in BK that make it prone to cyber-attacks. This report has been compiled to
expose such loophole and give proposals on how improve the cyber security at BK.
Proposal 1: malware-software prevention mechanism
According to Fielder et al. (2016), computer systems at Bk are infected by malicious softwares.
These softwares are capable of collecting data stored in a computer without the consent of the
user. This virus affects most of the ten laptops of the organisation. Technically, this program is
BK and cyber-security
Cyber security is defined as the attempt to make one’s computer device from unauthorized
access. In the modern world, computer technology is mushrooming. Computer systems have an
abundance of applications in every sector. The knowledge about computer systems has a wide
variety of applications. From communication by the use of internet to military strategies.
Industrialization and also businesses have benefited a lot from computer technology. It is
therefore very important to ensure one’s computer is secure
Enterprises, organizations and businesses are responsible to ensure all their computer systems are
secure. Such setups have very sensitive information. Malicious people may get access to this
information and bring a lot of harm to the company. Computers can be vulnerable to malicious
people through malicious programs. The first malicious program was developed in 1978. This
was the first step that led to more harmful malicious softwares over time. Viruses, Trojans,
malwares, adwares, worms and ransomwares are some of the most common malicious sofwares
that can easily compromise the security of a computer system.
The stakeholders at BK clearly don’t understand the importance of cyber security. There were
many loopholes in BK that make it prone to cyber-attacks. This report has been compiled to
expose such loophole and give proposals on how improve the cyber security at BK.
Proposal 1: malware-software prevention mechanism
According to Fielder et al. (2016), computer systems at Bk are infected by malicious softwares.
These softwares are capable of collecting data stored in a computer without the consent of the
user. This virus affects most of the ten laptops of the organisation. Technically, this program is
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CYBER SECURITY MANAGEMENT 5
threat the computer as it will affect the performance of the machines are hackers tends to use this
program to fetch confidential information and document of the organisation thus posing a risk to
theft. Additionally, malware software is prone to slowing down the performance of the
computers. Jouini and Rabai (2016) evaluated that malwares are used by hackers to attack
computer systems, thus leading to loss of the vital statistical information is an organization.
Many hackers create malware with the aim of making money. Malwares to disguise themselves
as a legit application so that they can gain access to your computer. For instance, some malwares
are developed in the form of spam messages. In this organization employees receive an average
of a 40-spam message. It was established that the spam messages were malwares attempting to
gain access to their computers (Wang et al.2013). Therefore, BK has the responsibility of
installing firewall subprogram their networks and antivirus softwares in their computers.
Additionally, updating the operating system and windows is another remarkable aspect that will
help overcome this problem since windows offer their built-in firewall and antivirus defensive
mechanism.
Fig 1 Diagram illustrating how malware software is prevented using firewall (source:
https://www.techgoondu.com/2017/10/02/best-practices-block-ransomware-firewall/)
threat the computer as it will affect the performance of the machines are hackers tends to use this
program to fetch confidential information and document of the organisation thus posing a risk to
theft. Additionally, malware software is prone to slowing down the performance of the
computers. Jouini and Rabai (2016) evaluated that malwares are used by hackers to attack
computer systems, thus leading to loss of the vital statistical information is an organization.
Many hackers create malware with the aim of making money. Malwares to disguise themselves
as a legit application so that they can gain access to your computer. For instance, some malwares
are developed in the form of spam messages. In this organization employees receive an average
of a 40-spam message. It was established that the spam messages were malwares attempting to
gain access to their computers (Wang et al.2013). Therefore, BK has the responsibility of
installing firewall subprogram their networks and antivirus softwares in their computers.
Additionally, updating the operating system and windows is another remarkable aspect that will
help overcome this problem since windows offer their built-in firewall and antivirus defensive
mechanism.
Fig 1 Diagram illustrating how malware software is prevented using firewall (source:
https://www.techgoondu.com/2017/10/02/best-practices-block-ransomware-firewall/)
CYBER SECURITY MANAGEMENT 6
Proposal 2: deployment of cryptographic techniques
According to the description provided about the BK Company, data is stored and transferred
without any form of encryption. According to the information offered in the field of computer
science, cryptography is a significant concept as far as data confidentiality is concerned. There
are two type of performing cryptography. The first technique of cryptography is performed via
the use of an encryption algorithm. The second technique is known as asymmetric cryptography.
Ideally, this concept is vital in securing information shared between the sender and the receiver.
In essence, cryptography ensures that the sender and the receiver pass the information
confidentially by preventing a third party from accessing that information. (Somani et al. 2017).
BK has the responsibility of adopting an encryption mechanism to enable the organisation to
secure and protect its information. Kumar et al. (2006) revealed that encryption of data will
ensure the organisation secures their sensitive information such as chats, emails, tax information,
portifolios and any other relevant sensitive information. BK should hire an expert in data
encryption to encrypt their information (Gupta et al. 2016).
This mechanism one of the best cyber security mechanisms since it is easy to perform even for
the computer illiterates. Finally, there is a need to use a private network to access the information
when working in the remote area. For that reason, encryption is one of the remarkable cyber
security mechanism of protecting information and data confidential. This is a practical approach
tha BK employ in in data protection.
Proposal 2: deployment of cryptographic techniques
According to the description provided about the BK Company, data is stored and transferred
without any form of encryption. According to the information offered in the field of computer
science, cryptography is a significant concept as far as data confidentiality is concerned. There
are two type of performing cryptography. The first technique of cryptography is performed via
the use of an encryption algorithm. The second technique is known as asymmetric cryptography.
Ideally, this concept is vital in securing information shared between the sender and the receiver.
In essence, cryptography ensures that the sender and the receiver pass the information
confidentially by preventing a third party from accessing that information. (Somani et al. 2017).
BK has the responsibility of adopting an encryption mechanism to enable the organisation to
secure and protect its information. Kumar et al. (2006) revealed that encryption of data will
ensure the organisation secures their sensitive information such as chats, emails, tax information,
portifolios and any other relevant sensitive information. BK should hire an expert in data
encryption to encrypt their information (Gupta et al. 2016).
This mechanism one of the best cyber security mechanisms since it is easy to perform even for
the computer illiterates. Finally, there is a need to use a private network to access the information
when working in the remote area. For that reason, encryption is one of the remarkable cyber
security mechanism of protecting information and data confidential. This is a practical approach
tha BK employ in in data protection.
CYBER SECURITY MANAGEMENT 7
Fig 2. Diagram illustrating data encryption (source:
https://en.wikipedia.org/wiki/Cryptography)
Proposal 3: peer-to-peer network
Paek (2015) opined that the organisation remains at risk as long as it deploys peer to peer
network. Peer-to-peernetworking is prone to poor data tracking because of minimal deployment
of authentication. Crossler (2017) argues that, peer to peer network is still used in some of the
organisations. In this form of topology, machines are capable of sharing files and data directly
without a central server. There is no central server that controls how data is shared within the
network. This form of networking is deployed in this organisation making data sharing insecure.
Given the above security issues that are associated with peer-to-peer networking topology, there
are some proven mechanisms that can be used to overcome these problems. One of the solutions
is encrypting the system. Encrypting the network will secure two main things that are vital in this
context (Gupta et al. 2016). This will secure the data in the traffic and also and data sreaming
will be secure too. Ericsson (2010) shows that another mechanism that can be deployed is
performing the anonymous peer-to-peer network. In this line of reasoning, the system in this
topology remains protected in the identity nodes and the prescribed users. Even though true
Fig 2. Diagram illustrating data encryption (source:
https://en.wikipedia.org/wiki/Cryptography)
Proposal 3: peer-to-peer network
Paek (2015) opined that the organisation remains at risk as long as it deploys peer to peer
network. Peer-to-peernetworking is prone to poor data tracking because of minimal deployment
of authentication. Crossler (2017) argues that, peer to peer network is still used in some of the
organisations. In this form of topology, machines are capable of sharing files and data directly
without a central server. There is no central server that controls how data is shared within the
network. This form of networking is deployed in this organisation making data sharing insecure.
Given the above security issues that are associated with peer-to-peer networking topology, there
are some proven mechanisms that can be used to overcome these problems. One of the solutions
is encrypting the system. Encrypting the network will secure two main things that are vital in this
context (Gupta et al. 2016). This will secure the data in the traffic and also and data sreaming
will be secure too. Ericsson (2010) shows that another mechanism that can be deployed is
performing the anonymous peer-to-peer network. In this line of reasoning, the system in this
topology remains protected in the identity nodes and the prescribed users. Even though true
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CYBER SECURITY MANAGEMENT 8
anonymity of a network is difficult to achieve, but creating real anonymity will tend to protect
the address of the data destination. Finally, another remarkable mechanism that should be
adapted is using the server based network by deploying cloud storage which remains
dependently managed by the site. For that matter, by deploying these mechanisms, the
organisation will see its objectives and marinating their market platform share in the market
(Jajodia et al. 2011).
Proposal 4: DSL alternative
BK organisation is using the DSL, which is limited to distance, and vulnerability to threat usage
mechanism. Technically, DSL tends to allow users to use the network simultaneously. There are
low upload speeds of the documents while using this form of the system. In the process, there is
the possibility of information to remain amalgamated by hackers (Gupta., 2016). In that regard,
most of the time organisations find this form of network impractical to use. It would be to use
DSL cables which is not limited to distance and traffic on the lines. Additionally, the data
transfer rate of a DSL cable doesn’t weaken with the increase of distance.
anonymity of a network is difficult to achieve, but creating real anonymity will tend to protect
the address of the data destination. Finally, another remarkable mechanism that should be
adapted is using the server based network by deploying cloud storage which remains
dependently managed by the site. For that matter, by deploying these mechanisms, the
organisation will see its objectives and marinating their market platform share in the market
(Jajodia et al. 2011).
Proposal 4: DSL alternative
BK organisation is using the DSL, which is limited to distance, and vulnerability to threat usage
mechanism. Technically, DSL tends to allow users to use the network simultaneously. There are
low upload speeds of the documents while using this form of the system. In the process, there is
the possibility of information to remain amalgamated by hackers (Gupta., 2016). In that regard,
most of the time organisations find this form of network impractical to use. It would be to use
DSL cables which is not limited to distance and traffic on the lines. Additionally, the data
transfer rate of a DSL cable doesn’t weaken with the increase of distance.
CYBER SECURITY MANAGEMENT 9
Fig 3 DSL cable diagram connection (source: https://kb.netgear.com/27017/How-to-setup-
install-the-D3600-for-DSL-connection)
Proposal 5: cyber security behaviors
According to Byres, and Lowe (2004), it is the responsibility of an organisation to protect the
organisation tools and assets. According to the findings, the organisation lacks the guideline that
governs the management and security of the firm data. For that matter, this report provides well-
presented guidance that speculates on the importance and responsibility of each employee as a
far as the information security and system is concerned. The guideline will present the security
program objectives, management responsibilities, and approaches that are required to build a
Fig 3 DSL cable diagram connection (source: https://kb.netgear.com/27017/How-to-setup-
install-the-D3600-for-DSL-connection)
Proposal 5: cyber security behaviors
According to Byres, and Lowe (2004), it is the responsibility of an organisation to protect the
organisation tools and assets. According to the findings, the organisation lacks the guideline that
governs the management and security of the firm data. For that matter, this report provides well-
presented guidance that speculates on the importance and responsibility of each employee as a
far as the information security and system is concerned. The guideline will present the security
program objectives, management responsibilities, and approaches that are required to build a
CYBER SECURITY MANAGEMENT 10
secure security program (Somani, 2017). For instance, the logical and technical control
measures, administrative measures, and physical measures.
Cost Design and Budget
In modern society, when an organisation opts for the cyber security mechanism, they expect to
reduce their vulnerability from cyber criminals. According to the study that has been carried out
in this field, close to 20% of the cybersecurity mechanism are reliable for performing the genuine
alerts mechanism. Organisations invest more than $1.3 million per year in cybersecurity. In this
context, the BK organisation has only two choices in the ideology of spending in this activity
(Gupta 2016). The first option that the organization has is to pay more to the scale of operation.
From the above discussion, it is clear that the organisation should be prepared to spend more
than $1.8 million to achieve the cybersecurity alerts that is vital to detect all the vulnerability of
risk in the organisation (Wang et al. 2015).
Summary
To sum up, this report has described the various mechanisms that BK would stay recommended
to deploy so that it can protect it information from the risk of being attacked. From the
discussion, it is clear that for an organisation to achieve its goals and objectives there are some of
the important strategies that need to be put in place. For this context, the discussed recommended
needs to stay addressed with immediate effect because they are key milestones that will see this
organisation to achieving its goals and objectives (Gupta 2016). Additionally, cyber security
activity is a vital activity in all organisations that tend to deal with sensitive information and
data, as there are more malicious individuals who work day to day to measure that they use
secure security program (Somani, 2017). For instance, the logical and technical control
measures, administrative measures, and physical measures.
Cost Design and Budget
In modern society, when an organisation opts for the cyber security mechanism, they expect to
reduce their vulnerability from cyber criminals. According to the study that has been carried out
in this field, close to 20% of the cybersecurity mechanism are reliable for performing the genuine
alerts mechanism. Organisations invest more than $1.3 million per year in cybersecurity. In this
context, the BK organisation has only two choices in the ideology of spending in this activity
(Gupta 2016). The first option that the organization has is to pay more to the scale of operation.
From the above discussion, it is clear that the organisation should be prepared to spend more
than $1.8 million to achieve the cybersecurity alerts that is vital to detect all the vulnerability of
risk in the organisation (Wang et al. 2015).
Summary
To sum up, this report has described the various mechanisms that BK would stay recommended
to deploy so that it can protect it information from the risk of being attacked. From the
discussion, it is clear that for an organisation to achieve its goals and objectives there are some of
the important strategies that need to be put in place. For this context, the discussed recommended
needs to stay addressed with immediate effect because they are key milestones that will see this
organisation to achieving its goals and objectives (Gupta 2016). Additionally, cyber security
activity is a vital activity in all organisations that tend to deal with sensitive information and
data, as there are more malicious individuals who work day to day to measure that they use
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CYBER SECURITY MANAGEMENT 11
malicious software to access confidential information and perform theft. For that matter,
configuration and provision of securities on the networks and computers used is a crucial
activity,
malicious software to access confidential information and perform theft. For that matter,
configuration and provision of securities on the networks and computers used is a crucial
activity,
CYBER SECURITY MANAGEMENT 12
REFERENCES
Bonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., &Chizeck, H. J. (2015). To make a robot
secure: An experimental analysis of cyber security threats against teleoperated surgical
robots. arXiv preprint arXiv:1504.04339.
Brown, S., Gommers, J., & Serrano, O. (2015, October). From cyber security information
sharing to threat management. In Proceedings of the 2nd ACM workshop on information
sharing and collaborative security (pp. 43-49). ACM.
Byres, E., & Lowe, J. (2004, October). The myths and facts behind cyber security risks for
industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).
Crossler, R. E., Bélanger, F., & Ormond, D. (2017). The quest for complete security: An
empirical analysis of users’ multi-layered protection from security threats. Information
Systems Frontiers, 1-15.
Ericsson, G. N. (2010). Cyber security and power system communication—essential parts of a
smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501-1507
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., &Smeraldi, F. (2016). Decision support
approaches for cyber security investment. Decision Support Systems, 86, 13-23.
Gai, K., Qiu, M., &Elnagdy, S. A. (2016, April). A novel secure big data cyber incident analytics
framework for cloud-based cybersecurity insurance. In Big Data Security on Cloud
REFERENCES
Bonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., &Chizeck, H. J. (2015). To make a robot
secure: An experimental analysis of cyber security threats against teleoperated surgical
robots. arXiv preprint arXiv:1504.04339.
Brown, S., Gommers, J., & Serrano, O. (2015, October). From cyber security information
sharing to threat management. In Proceedings of the 2nd ACM workshop on information
sharing and collaborative security (pp. 43-49). ACM.
Byres, E., & Lowe, J. (2004, October). The myths and facts behind cyber security risks for
industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).
Crossler, R. E., Bélanger, F., & Ormond, D. (2017). The quest for complete security: An
empirical analysis of users’ multi-layered protection from security threats. Information
Systems Frontiers, 1-15.
Ericsson, G. N. (2010). Cyber security and power system communication—essential parts of a
smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501-1507
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., &Smeraldi, F. (2016). Decision support
approaches for cyber security investment. Decision Support Systems, 86, 13-23.
Gai, K., Qiu, M., &Elnagdy, S. A. (2016, April). A novel secure big data cyber incident analytics
framework for cloud-based cybersecurity insurance. In Big Data Security on Cloud
CYBER SECURITY MANAGEMENT 13
(BigDataSecurity), IEEE International Conference on High Performance and Smart
Computing (HPSC), and IEEE International Conference on Intelligent Data and Security
(IDS), 2016 IEEE 2nd International Conference on (pp. 171-176). IEEE.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI Global.
Jajodia, S., Ghosh, A. K., Swarup, V., Wang, C., & Wang, X. S. (Eds.). (2011). Moving target
defense: creating asymmetric uncertainty for cyber threats (Vol. 54). Springer Science &
Business Media.
Jouini, M., &Rabai, L. B. A. (2016). A security framework for secure cloud computing
environments. International Journal of Cloud Applications and Computing
(IJCAC), 6(3), 32-44.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
Kumar, V., Srivastava, J., & Lazarevic, A. (Eds.). (2006). Managing cyber threats: issues,
approaches, and challenges (Vol. 5). Springer Science & Business Media.
Paek, S. H., Park, I. S., Lee, E. Y., Yun, J. B., Sohn, K. W., & Choi, S. J. (2014). U.S. Patent No.
8,800,037. Washington, DC: U.S. Patent and Trademark Office.
(BigDataSecurity), IEEE International Conference on High Performance and Smart
Computing (HPSC), and IEEE International Conference on Intelligent Data and Security
(IDS), 2016 IEEE 2nd International Conference on (pp. 171-176). IEEE.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI Global.
Jajodia, S., Ghosh, A. K., Swarup, V., Wang, C., & Wang, X. S. (Eds.). (2011). Moving target
defense: creating asymmetric uncertainty for cyber threats (Vol. 54). Springer Science &
Business Media.
Jouini, M., &Rabai, L. B. A. (2016). A security framework for secure cloud computing
environments. International Journal of Cloud Applications and Computing
(IJCAC), 6(3), 32-44.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
Kumar, V., Srivastava, J., & Lazarevic, A. (Eds.). (2006). Managing cyber threats: issues,
approaches, and challenges (Vol. 5). Springer Science & Business Media.
Paek, S. H., Park, I. S., Lee, E. Y., Yun, J. B., Sohn, K. W., & Choi, S. J. (2014). U.S. Patent No.
8,800,037. Washington, DC: U.S. Patent and Trademark Office.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CYBER SECURITY MANAGEMENT 14
Somani, G., Gaur, M. S., Sanghi, D., Conti, M., Rajarajan, M., &Buyya, R. (2017). Combating
DDoS attacks in the cloud: requirements, trends, and future directions. IEEE Cloud
Computing, 4(1), 22-32.
Wang, B., Zheng, Y., Lou, W., &Hou, Y. T. (2015). DDoS attack protection in the era of cloud
computing and software-defined networking. Computer Networks, 81, 308-319.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer
Networks, 57(5), 1344-1371.
Somani, G., Gaur, M. S., Sanghi, D., Conti, M., Rajarajan, M., &Buyya, R. (2017). Combating
DDoS attacks in the cloud: requirements, trends, and future directions. IEEE Cloud
Computing, 4(1), 22-32.
Wang, B., Zheng, Y., Lou, W., &Hou, Y. T. (2015). DDoS attack protection in the era of cloud
computing and software-defined networking. Computer Networks, 81, 308-319.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer
Networks, 57(5), 1344-1371.
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.