1. Deepa, T.: Survey on need for cyber security in India (2014)
2. Dwivedi, D.: Technological challenges to human security in the age of information and cyber wars. Int. J. Basic Appl. Res. 8, 40–48 (2018)
3. Defort, M.: Human security in the digital age: a relocation of power and control over security from state to non-state actors. Small Wars J. (2015)
4. The 12 types of cyber crime.
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
. Last accessed 21 Nov 2016
5. Rouse, M.: Trojan Horse (computing).
https://searchsecurity.techtarget.com/definition/Trojan-horse
. Last accessed 29 May 2019