Page 338

The University of SydneyPage 38References–Principles of Information Security Systems –Texts and Cases –Gurpreet Dhillon•Chapter 6 : Security of Formal systems in Organisations–NIST Cybersecurity Framework•https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdfFurther Reading:–https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2016/why-conquering-complexity-is-a-critical-component-of-an-effective-security-program–https://www.isaca.org/resources/isaca-journal/issues/2020/volume-4/building-an-enterprise-security-program