Total Length: 709 words ( 2 double-spaced pages)
Total Sources: 5
Page 1 of 2
Chertoff, M. & Grant, J. (2017). 8 ways governments can improve their cybersecurity. HBR.
Retrieved from: https://hbr.org/2017/04/8-ways-governments-can-improve-their- cybersecurity
CIKR. (2009). DHS. Retrieved from: https://www.dhs.gov/blog/2009/11/19/cikr
Harwell, D. (2018). Algorithms just made a couple of crazy trading days that much crazier.
The Washington Post. Retrieved from: https://www.washingtonpost.com/news/the- switch/wp/2018/02/06/algorithms-just-made-a-couple-crazy-trading-days-that-much- crazier/?noredirect=on&utm_term=.b4ed836c6e3a
Tal, J. (2018). America’s critical infrastructure: Threats, vulnerabilities and solutions. Bosch.
Retrieved from: https://www.securityinfowatch.com/article/12427447/americas-critical- infrastructure-threats-vulnerabilities-and-solutions
Latest APA Format (6th edition)
"What Is Critical Infrastructure" (2018, September 21) Retrieved September 19, 2019, from
Latest MLA Format (8th edition)
"What Is Critical Infrastructure" 21 September 2018. Web.19 September. 2019. <
Latest Chicago Format (16th edition)
"What Is Critical Infrastructure", 21 September 2018, Accessed.19 September. 2019,