References
[1]. Anon, 10 ways to reduce cybersecurity risk for your organization. Upguard. Available at: https://www.upguard.com/blog/reduce-cybersecurity-risk [Accessed September 22, 2022].
[2]. Anon, 2021. What is cyber warfare: Types, examples & mitigation: Imperva. Learning Center. Available at
[3]. : https://www.imperva.com/learn/application-security/cyber-warfare/[Accessed September 22, 2022].
[4]. Anon, 2022. Iran–Saudi Arabia proxy conflict. Wikipedia. Available at: https://en.wikipedia.org/wiki/Iran%E2%80%93Saudi_Arabia_proxy_conflict
[5]. [Accessed September 22, 2022].
[6]. Anon, 2022. Russian interference in the 2016 United States elections. Wikipedia. Available at:
[7]. https://simple.wikipedia.org/wiki/Russian_interference_in_the_2016_United_States_ele ctions [Accessed September 22, 2022].
[8]. Anon, 2022. Secondary research: Definition, methods, & examples. Qualtrics AU. Available at:
[9]. https://www.qualtrics.com/au/experiencemanagement/research/secondaryresearch/?rid=ip&prevsite=en&newsite=au&geo=IN&geomatch=au [Accessed September 22, 2022].
[10]. Anon, 2022. Shamoon. Wikipedia. Available at: https://en.wikipedia.org/wiki/Shamoon [Accessed September 22, 2022].
[11]. Anon, 2022. Sony Pictures hack. Wikipedia. Available at: https://en.wikipedia.org/wiki/Sony_Pictures_hack [Accessed September 22, 2022].
[12]. Anon, 2022. Stuxnet. Wikipedia. Available at: https://en.wikipedia.org/wiki/Stuxnet [Accessed September 22, 2022].
[13]. Anon, 2022. WannaCry ransomware attack. Wikipedia. Available at: https://en.wikipedia.org/wiki/WannaCry_ransomware_attack [Accessed September 22, 2022].
[14]. Anon, What is cyber warfare? Fortinet. Available at: https://www.fortinet.com/resources/cyberglossary/cyber-warfare#:~:text=Cyber%20Wa rfare%20is%20typically%20defined,denial%2Dof%2Dservice%20attacks [Accessed September 22, 2022].
[15]. Djs, 2021. Pros and cons of cyber warfare. Bohatala. Available at: https://bohatala.com/pros-cons-cyber-warfare/ [Accessed September 22, 2022].
[16]. Elazari, K., 2021. Cyber warfare in global conflicts. Iberdrola. Available at: https://www.iberdrola.com/shapes-en/keren-elazari-cyber-warfare-in-context-of-global- conflicts [Accessed September 22, 2022].
[17]. Gazula, M.B., 2017. Cyber Warfare Conflict Analysis and Case Studies. MIT CAMS. Available at: https://cams.mit.edu/wp-content/uploads/2017-10.pdf [Accessed September 22, 2022].
[18]. Menon, N., 2021. The potential impact of cyber capabilities on future strategy. E-IR. Available at: https://www.e-ir.info/2021/05/05/the-potential-impact-of-cyber-capabilities-on-future-st rategy/ [Accessed September 22, 2022].
[19]. O'Neil, M., 2016. Cybercrime dilemma: Is it possible to guarantee both security and privacy? Brookings. Available at: https://www.brookings.edu/articles/cybercrime-dilemma-is-it-possible-to-guarantee-bot h-security-and-privacy/ [Accessed September 22, 2022].