Monday, December 30, 2019

Make a Mixture and a Compound from Iron and Sulfur

A mixture occurs when you combine matter in a way where the components can be separated again. A compound results from a chemical reaction between components, forming a new substance. For example, you can combine iron filings with sulfur to form a mixture. All it takes is a magnet to separate the iron from the sulfur. On the other hand, if you heat the iron and sulfur, you form iron sulfide, which is a compound. What You Need Iron filingsSulfur  (powder or flowers of sulfur)MagnetTest tube or beakerBurner or hot plate or stove Creating a Mixture and Then a Compound First form a mixture. Stir some iron filings and sulfur together to form a powder. You have just taken two elements and combined them to form a mixture. You can separate the components of the mixture by stirring the powder with a magnet (iron will stick to it) or by swirling the powder with the magnet under the container (the iron will fall toward the magnet at the bottom - this is less messy).If you heat the mixture over a bunsen burner, hot plate, or stove, the mixture will start to glow. The elements will react and will form iron sulfide, which is a compound. Careful! Unlike the mixture, the formation of a compound cant be undone so easily. Use glassware that you dont mind ruining. When you form a mixture, you can add components in any ratio that you want. It doesnt matter if there is more iron than sulfur, for example. When you form a compound, the components react according to a set formula. If there is an excess of one or the other, it will remain after the reaction that forms the compound. For example, you may have some leftover iron or sulfur in the tube with your mixture. 2 grams of sulfur with 3.5 grams of iron filings will completely react.

Sunday, December 22, 2019

What Is the Role of the Chorus in Medea Essay - 680 Words

In Medea an essential character is the chorus of Corinthian women. They help obtain Euripides truly genius paradox of achieving empathy from the readers for a mother who sheds her own childrens blood. One of the major turning points in the play is when Medea asks for the chorus of womens silence as she contrives an evil plot to gain revenge. They agree immediately and are henceforth wrapped up in the play and the malicious plot. This I promise. You are right, Medea, / In paying your husband back. I am not surprised at you / For being sad (265 - 266). Through stasimons throughout the play they embody everywoman and represent the feelings of the female Greek world. The first stasimon is a plea for all women to unite in the†¦show more content†¦The Chorus still feels pity for Medea, shown later in the stasimon when they imagine the destitute that she is about to endure. Medea has become an outcast from both her homeland and her newly adopted home. This hopelessness makes her even more the perfect target for the choruss pity. Their maternal instincts want nothing more than to comfort the poor Medea. The first time where the chorus begins to truly doubt Medea is in the third satsimon. O, over and over I beg you, / By your knees I beg you do not / Be the murderess of your babes (829 - 831)! The chorus begs and pleads with Medea not to kill her children. They confirm that this kind of behavior was not acceptable even in the most ancient of times. Revenge is expected, but the bloodshed of your own flesh is not expected nor accepted. The stasimon sung after Medea has persuaded Jason to let their children offer gifts to his new bride, shows the choruss initial sympathy for Medea has now transferred to sympathy for her soon-to-be victims. They mourn for the children, the bride, and they even have a few words of condolence for Jason. You too, O wretched bridegroom, making your match with kings (964). They had once sympathized with Medea who called for them claiming they must unite together as women. The Chorus realizes that Medea is not a good model or representation of women as a whole. She often portrays male like qualities such as her barbarian behavior, clever reputation, andShow MoreRelated The Importance of the Role That the Chorus Plays in Euripedes’ Medea1142 Words   |  5 Pagesof the Role That the Chorus Plays in Euripedes’ Medea The Chorus is very much an important part of Euripedes’ Medea, and indeed many other works written in the ancient Greek style. In this play, it follows the journey Medea makes, and not only narrates, but commentates on what is happening. Euripedes uses the Chorus as a literary device to raise certain issues, and to influence where the sympathies of the audience lie. In the list of characters at the beginning of the play, the Chorus is statedRead MoreMedea: Discuss the Role of the Chorus Essay1210 Words   |  5 PagesDiscuss the importance of the role that the Chorus plays in Euripedes Medea. br brThe Chorus is very much an important part of Euripedes Medea, and indeed many other works written in the ancient Greek style. In this play, it follows the journey Medea makes, and not only narrates, but commentates on what is happening. Euripedes uses the Chorus as a literary device to raise certain issues, and to influence where the sympathies of the audience lie. br brIn the list of characters at theRead MoreEssay about The Role of Minor Characters in Medea by Euripides1260 Words   |  6 Pagesone of him most famous plays, Medea. This play is a fascinating classic centered on the Greek goddess Medea. Despite its recent fame, during his time, Euripides was unpopular since he used what would be considered a ‘modern’ view where he would focus on women, slaves and persons from the lower classes. In the play, Medea commits filicide, which initially appears extremely horrendous, but as the audience is guided through the play, they develop sympathy towards Medea. In order to achieve this empathyRead MoreEssay about chorus role in medea782 Words   |  4 Pages The Chorus influences our response to Medea and her actions in both a positive and negative manner. The Chorus, a body of approximately fifteen Corinthian women who associate the audience with the actors, is able to persuade and govern us indirectly through sympathy for what has been done to Medea, a princess of Colchis and the victim of her husband’s betrayal of love for another woman. The Chorus also lead us to through sympathy for Medea to accept her decision of taking revenge on princess GlauceRead MoreThe Chorus as a Homonym 1168 Words   |  5 Pages In Jean Anouilh’s Antigone and in Euripides’s Medea the Chorus is both a tool for c haracterization and representation of theme; however, the ways they function in their respective plays are noticeably different. The differences in the way the Choruses function in each respective play make the name of the character â€Å"the Chorus† a homonym, same name different meaning. The Chorus in Antigone functions to incorporate the technique of metatheatre. The purpose of metatheatre is to provide a separationRead MoreEssay on The Role of the Chorus in Ancient Greek Tragedies1157 Words   |  5 Pagesjustice works differently in Euripides’ Medea and Aeschylus’ The Libation Bearers. In both The Libation Bearers and Medea, the driving force of vengeance links the chorus to each of the play’s protagonists. For both plays, the choruses begin with a strong support of their heroes with a belief that the course of action that those characters are pursuing for the sake of avenging the wrongs done to them or their families is just and right. The chorus of Medea, however, moves away from that originalRead More Euripides was accused by his contempories of being a woman hater. Why1711 Words   |  7 Pageswrites. Whether it is hatred or not, women play a major role in a Euripian play. Their role in society of that time was a great contrast to that of the men. Compared to today, women were miles apart from men; they were not even considered citizens of their region. This is obvious in the chorus where in the Electra, Medea and Hippolytus there is a chorus of women. This was unheard of in the time when the plays were written. A chorus is typically made up of wise men of Athens, therefore makingRead More Euripides Medea Essay1038 Words   |  5 PagesEuripides Medea Medea is the tragic tale of a woman scorned. It was written in 431 B.C. by the Greek playwright, Euripides. Eruipides was the first Greek poet to suffer the fate of so many of the great modern writers: rejected by most of his contemporaries (he rarely won first prize and was the favorite target for the scurrilous humor of the comic poets), he was universally admired and revered by the Greeks of the centuries that followed his death(Norton Anthology;). Euripides showedRead MoreWild Revenge in Medea Essay870 Words   |  4 Pageson whether it is an act that vindicates those who have been wronged or an excuse to pursue revenge. Through Medea, Medea’s actions have been judged and criticised whether her murders are an act of justice that she deserves or simply the idea of inflicting pain on those she loathes. Revenge is the predominant motivator for the psychological and corporeal action of the play. In the play, Medea is self absorbed into her misery, her determination of inflicting pain and suffering to Jason consumes herRead MoreEvaluation of Euripides Essay942 Words   |  4 Pagesthe present day era is Medea. In it, he depicted the struggle between a mothers love for her children and a flouted wifes desire for revenge on her husband. Like much of Euripides work, it is a tale which sometimes abandons, and sometimes, emphasises the age old conventions of Attic tragedy. Attic tragedian plays traditionally follow a predetermined structure and cycle. This convention was used to characterise the play. In Euripides Medea, we see this tradition upheld

Saturday, December 14, 2019

A Regression Model Free Essays

Introduction A regression model with one explanatory variable is called a Simple linear regression, that is it involves 2 points: single explanatory variable and the response variable which is the dependent variable Y and independent X, in the graph of two axis y and x coordinate and finds a linear function, as precisely as it can to explains the response variable values as a function of the expanatory variables. The term simple means in statistics that the response variable y is related to one predictor x. The linear regression is given as Y=?0+?1 + ? and they are two parameters that are used estimate the slope of the line ?1 and the y- intercept of the line ?0. We will write a custom essay sample on A Regression Model or any similar topic only for you Order Now ? is the error term.Background Linear Regression has played a vital role in assisting in the analysis of medical data. It makes it possible for the recognition and grouping associated multiple factors. It as well also allows the recognition of anticipating related dangerous factors and the counting of dangerous scores for a single person’s prediction, this was made possible by English scientist Sir Francis Galton (1822–1911), a family member of Charles Darwin, made sufficiently benefaction to both in the study of genes and in the study of behaviour and mind . He is the one that came with regression and introduced statistics in a study of living organism.In his study the data sets that he regarded persistent was the heights of male parent and male child (father and son). He wanted to find out whether he can predict the height of a male child based on the male parent’s height. Glancing at the results and scatterplots of the heights, Galton noted the relationship which was increasing and it was linear. After drawing a line to these results using the statistical tools, he observed that for male parents whose heights were more than the normal, the regression line anticipated male parents whose heights were more than the normal tended to have male children that have less height than the normal and male parents that have a height which is less than the normal tended to have male children that have a height that is more than the normal . Purposes Simple linear regression could be for example be purposefully in the instance of a an association among weight and height, Weight being the dependent variable y measured in kilograms and height being the independent variable x in centimeters, where the expected value of weight at a specified height is (X) = 2X/4 – 45 for X 100 for example. Because of natural changeability, the weight could differ for example, it might remain normally distributed with a still ? = 4. The change between an experimental weight and mean weight at a specified height is denoted as the error for that weight. To realize the association that is linear, we might take the weight of three personalities at each height and relate linear regression to model the mean weight as a function of height using a straight line, ?(X) = ?0 + ?1X . The most general way to guesstimate the parameters, (pronounced beta not) ?0 and gradient ?1 (pronounced as beta not) is the least squares estimator, which is derived by differentiating the regression model with respect to ?0 and ?1 and solving for ?0 and also solving for ?1. Let (x i , y i ) be the Ith coordinates of Y and X. The least squares estimator, guesstimates the intercept and the slope reducing the residual sum of squared errors ?ei2= ?(y i – ? i)2= SSE where yi is the experiential value and ?i = b0 + b1xi is the estimated regression line and is called the fitted or â€Å"hat† values. The estimates are given by b0 = – b1 then b1 = SSXX / SSYY and where and are the samples means X and Y, SSXX and SSYY being standard deviations and r = r(X,Y) Pearson correlation coefficient. It is also denoted as Pearson’s r, the Pearson product-moment correlation coefficient, is a measure of the linear associate amongst two variables X and Y. The Pearson correlation coefficient, r takes a variety of values from -1 to +1. A value of 0 recommends that there is no relationship amongst the variables X and Y. A value greater than 0 recommends a positive relationship that is, as the value of the other variable rises, so does the other variable. Before making use of the simple linear regression it is always vital to follow the steps below:1. Select an explanatory variable which is more possible to make the changes in the response variable Be convinced where the previous quantity for the explanatory variable transpire in the precise same period as the quantity of the respone variable Plot the interpretations on a graph making use of the y axis for the respone variable and the x axis for the predictor variable 4. Analyse the plotted interpretations for a linear outline and for any outliers Keeping in mind that there could be correlation without cause and influence. Importances Simple linear regression is considered to be widely valuable in many real-world applications and practises. Simple linear regression functions by assuming the independent and dependent variables have a association that is linear in the certain set-of-data. As expectations are and outcomes are interpreted, the individual handling the analysing role in a such data will have to be precarious since it has been premeditated before that there may be some variables which hinder minimal changes to occur while others will not consider being seized at a stationary point. Although the concept of linear regression is one that is more composite subject, it still remains to be one of the most vital statistical approaches being used till date. Simple linear regression is important because it has be wildly being used in many biological, behavioural , environmental as well as social sciences. Because of its capability to define likely associations among known variables which are simple independent and dependent , it may have assisted in the fields of finance, economics and trend line in describing major data that have proven to be of crux in the selected areas. Above all simple linear regression is vital since it has provided a clue of what desires to be predicted, more specially in regulatory functions involved in certain disciplines. In spite of the complication of simple linear aggression, it has been recognized to be sufficiently valuable in numerous day-to-day applications of life. How to cite A Regression Model, Papers

Friday, December 6, 2019

ENISA Big Data Threat Landscape Samples †MyAssignmenthelp.com

Question: Discuss about the ENISA Big Data Threat Landscape. Answer: ENISA is the European Union Agency for Network and Information Security. This agency enables the cyber security in the organizations of Europe. NIS (Network and Information Security) of high level are contributed by ENISA within the union of ENISA (Reuter, 2015). This is done by promoting and developing the culture of Network and Information Security so that it can assist to function good and properly in internal market. The ENISA was set up in the year 2004 to contribute a NIS to level up in the European Union. To proper functioning of internal market, ENISA has implied a developed culture of Network and Information Security. To give the solutions and advice, the agency works with the members of the state and also the private sector (Schneider, 2017). The exercises of cyber security of pan European is included in ENISA along with the strategies of for developing the National Cyber Security. ENISA also includes exercises on capacity and cooperation of CSIRT and also gives security on cloud adoption, addressing the issues related to data protection, enhancing technologies that are private, emerging technologies that are private trust services and email ids an also cyber threat landscape. The implementation and the development of the Union policy of Europe and the law that are related with Network and Information Security are also supported by ENISA. The case study that is given is about the Threat landscape of ENISA which was reported last year in 2016. The top threats that are faced by the cyber sector are given in details in this case study. All these cyber attacks was assessed and reported in 2016. Increasing cyber threats have leaded the European Threat Landscape to concentrate more on the attacker and attack vectors and find their solutions that are needed to mitigate them (Eininger, Skopik Fiedler, 2015). The top cyber attacks are detailed in this case study and their respective mitigations are also described. There are all total of fifteen top cyber attacks that Europe have came across and all the kill chain of the respective threats have been clearly described. The threat agents are elaborated in this case study that is associated with the cyber attacks of the European countries. The trend of threat agents, and their motives along with the defenders of the threat attackers are briefly discussed (Bendiek, 2015). Some com mon examples are given that are related to ransomware attack, data breach attack, Denial of services attack and the targeted attack. The diagram that shows the infrastructure of ENISA Big Data security is given below. This case study involves fifteen types of top threats that ENISA faces. They are as follows: Malware: Malwares are the top cyber attack for the present year. The malware of the cyber threat are mainly information stealing and the ransomware attack. Malwares are qualitative concern instead of quantitative concern (Weber, A., Weber, 2015). The malware that has increased during the report that was filed in 2016 is the mobile malware. The current trend that has been observed for malware is increasing. The threats that are related to malwares are spam, exploit kits, data breach and leakage of information. Web-based attacks: The attacks that use components of web as a medium of attack are called the web based attacks. The threats related to web clients and web server are the web based attacks. This type of threat is discrete to the web application attacks (Witt Freudenberg, 2016). The current trend that has been observed is increasing. The threats that are related are botnets, data breaches, information leakage, spam and malware. Attacks of web application: The attacks that are against the web services or the web applications are called the web applications. This attack overlaps the web based attacks. Web applications are available assets that attack the surface that are challenged by the agents of threat. The current trend that has been observed is increasing (Catteddu Hogben, 2015). The threats that are related are botnets, data breaches, information leakage, spam and malware. Denial of Service: Denial of Services has created an important aspect in the cyber threat attack. Denial of Services led to infrastructure and services down, extortion and the data breaches that take place in cyber attack. The current trend that has been observed is increasing. The threats that are related are information leakage, spam and malware, botnets, data breaches, phishing and web based applications. Botnets: The work horse adversaries are the botnets. The roles of botnets are increased and the uses of botnets are also increased with addition of complexity and maturity. Bonnets are resilience. The current trend that has been observed is increasing. The threats that are related are information leakage, spam and malware, data breaches, phishing, web based applications and denial of services. Phishing: The cyber threat that is present in many cyber attacks is phishing. Use of phishing attacks are increasing day by day. This attack method has not increased by its number. It has increased by better methods and better quality to target the victims. The data that are found in social media are abused by phishing attack (Exchange, 2016). The current trend that has been observed for phishing is slightly decreasing or may be stated as stable. The threats that are related are information leakage, spam and malware, botnets, phishing, web based applications, denial of services and data breaches. Spam: The transport of malicious URLs and malware are the main types of spam. The URLs are attached accordingly with the email ids as a phishing message or spam message. Big spam botnets are needed to distribute the spam mainly. The current trend that has been observed for spam is reducing. The threats that are related are information leakage, malware, botnets and data breaches. Ransomware: The most impressive and increasing growth that has been observed in 2016 is the ransomware attack. The main motive of the criminals of cyber attack is manifestation of monetization of the victims. The current trend that has been observed for ransomware is increasing tremendously. The threats that are related are information leakage, spam and malware, bonnets, data breaches, phishing, web based attacks, denial of services and attacks of web application. Insider threat: The threat landscape of cyber security includes insider threat as an important aspect. With better understanding the analysis and assessment, the idea of insider threat becomes clear (Schaumller-Bichl Kolberger, 2016). This includes protecting a system that are used by the employees of the organization and misusing those applications. The current trend that has been observed is stable and has a flat increase. The threats that are related are information leakage, spam and malware, bonnets, data breaches and phishing. Physical manipulation: The main reason of information leakage and data breaches are the damage, loss or theft that are caused physically. This is most dangerous impact of all kinds of assets that are digital. Loss of USB drives or laptops leads to data breaches up to 40 percent. The current trend that has been observed is increasing. The threats that are related are information leakage, data breaches, attacks of web applications, attacks that are web based and identity threats. Exploit kits: Exploit kits are similar to botnets. These are the main tools that are used for installing a malware. The vulnerabilities that are found on the devices of the victims are all installed by this dangerous exploit kits. The current trend that has been observed is increasing. The threats that are related are information leakage, data breaches, malware, spam and botnets. Data breaches: The attempts that are used to compromise the data confidentiality which grows are the work of data breach. The data breach has grown to an amount of 25 percent more in 2016 than in 2015. The data that are breached are more personal to the users. The current trend that has been observed is increasing. The threats that are related are information leakage, data breaches, malware, spam, botnets and identity theft. Identity theft: The attack that provides the identity of machines or human are the attacks related to identity theft. Human cyber attacks are related to those which reveals the name, account number and the bank details of the person. Machine identity states the information about the machine such as passwords or email ids. The current trend that has been observed is decreasing. The threats that are related are information leakage, data breaches, malware, spam and botnets. Information leakage: The cyber threats that deal with abusing the weakness id systems that are used at run time, mistakes that happens at run time and components configuration. Leaking of information leads to enhance other crimes that are related to cyber attack. The current trend that has been observed is increasing. The threats that are related are information leakage, spam, data breaches, botnets and malware. Cyber espionage: The national security thefts that are held are the state sponsored and intelligence espionage related to military. The intelligence methods and the intelligence cyber threat methods give a compliment that comes from the field of military. This releases new potential for the cyber space areas that reinforce mutually to each other. The current trend that has been observed is increasing. The threats that are related are attacks related to web application, data breaches, attacks that are web based and identity threats. Most significant attack is the ransomware attack that has become an important issue of the cyber attack. It is a dangerous attack that affects the systems of the victims (Jentzsch, 2016). This ransomware attacks mainly the emails of the victims. Files are added to the emails of the victims showing that it a file that is send from a original sender or a sender that the victims knows. Once the user opens the files, Google Docs page is opened and if the user gives the permission to acces al the data, then the attacks gets an access to the system of the user. Key threats agents are: Cyber criminals- The most active group in the cyber space which holds two third of the incidents that are registered is the cyber criminals (Christou, 2017). The groups of cyber criminals have changed over the past years. It has progressed and matured over the time period. The cyber criminals are mostly famous in e-health and banking sectors. Insiders- Insiders are the attackers that attack the cyber space intentionally as well as unintentionally (Kubicek Diederich, 2015). Error, negligence and intention are the types of insider attacks that are performed by the insiders of an organization. Executive managers or any employees in an organization are subjected to insider threat. Nation States and Corporations- Corporations and the national states are together known as the cyber spines the military organizations and intelligence agencies are included in this group. The difference between the cyber combating and cyber spying are not clear due to pre maturity of cyber capabilities. Hacktivists- Hacktivists have mostly flourished in the year of 2016. The protests of hacktivists are mainly on the themes of discrimination, corruption, public health issues, support of minorities and the environmental policy (Stupka, Hork Husk, 2017). Examples of hacktivists are the Olympic Games and Football Tournament of Euro in 2016. Cyber fighters- The groups that are aggressive and high campaigns of capability are called as cyber fighters. This group lies in the grey zone according to the ideological values. The group of this type of threat is distributed all over the world. Cyber terrorists- the focus from the community of cyber security is moved to cyber terrorism according to the international engagements and the media reports against the ISIS (Unger, 2014). No such attacks are categorized for the cyber terrorist attack. The main areas of cyber terrorists are defacements, hijacking social media and hacking. Script kiddies- This type of attackers are known as copy cats or they simply hacks for fun (Lanfer, 2017). These groups of threats are mainly of low motivation and low capability which practices their hacking capabilities. Script kiddies may use the tools that are available, attack methods and anonymization to become more dangerous. To minimize the impact of attack on systems defenders have found some mitigation process and improved themselves to cope up with the attackers. The agencies to defend the cyber attack have become very active in arresting the cyber criminals and the infrastructure that are needed (Hnisch Rogge, 2017). No statistical proofs of the attacks or the trends can be made from the cyber criminals. The capitalization of the cyber crime has also increased the adversaries to records at all the time. The monetization has helped to record the turnover of the cyber activities as a result the trend seems to continue. The level of threshold is raised instead of defender engagements. The entry level of the capability of hackers is higher in spite of the available information (Kleineidam et al., 2017). This makes the hackers less opportunistic and hacking of low capability. The process of ETL (European Threat Landscape) can be improved by: Only the data that are needed in minimum should be taken at the time of processing the batch (Bartsch Frey, 2017). Sequence and time stamps should be used to do the changes. Cache lookups against the large tables should not be performed in ETL tool. Row by roe processing is to be avoided while using the ETL tool. Bulk loading options are to used in the ETL process. The table joins should be off loaded to the database for sources that comes from the database. Many parallel threads should be used for scheduling the ETL logic. Cursors should be used in any of the tools that are related with European Threat Landscape. If stored procedures are used in processing of ETL, all the parameters should be copied into different variables from the stored procedure. There is no space for improvement. ENISA should increase its security process more to cope up with all the new cyber threats that are evolving every day (Bastl, Mare Tvrd, 2015). Following processes should be taken care of to increase the security process of ENISA. Mobile internet should be taken care of by ENISA (Silva, Rocha Guimaraes, 2016). From the reporting of the last year it can be stated that more the 44 percent victims using mobile internets faced the cyber security problems. Technical failure and System failures are the most important and the root cause of the cyber threat attack. 70 percent of the attacks that are faced in the sector of cyber space are because of technical failure and system failure. In the year 2015, human errors were the root cause of the cyber security that affected the users. Nearly 2.6 billion connections of the user faced the incident of human errors. References Bartsch, M., Frey, S. (2017).State-of-the-art approaches.Incyber strategies for enterprises and authorities(pp. 55-71).Springer Specialties Wiesbaden. Bastl, M., Mare, M., Tvrd, K. (2015).Cybersecurity policy at national, European and international level: a framework analysis.Incyber security(pp. 45-67).Springer Specialties Wiesbaden. Bendiek, A. (2015, December).Digital Agenda and Cybersecurity.In theYearbook of European Integration 2015(pp. 176-181).Nomos publishing company mbH Co. KG. Catteddu, D., Hogben, G. (2015). Cloud computing.Benefits, Risks and Recommendations for Information Security/European Network and Information Security Agency, ENISA (November 2015). Christou, G. (2017).The EU's Approach to Cybersecurity. Eininger, K., Skopik, F., Fiedler, R. (2015).No cyber security without data protection.Data protection and data security,39(11), 723-729. Exchange, p. (2016).Violation of personal rights through the publication of photos on the Internet.Nomos publishing company mbH Co. KG. Hnisch, T., Rogge, S. (2017).IT security in the industry 4.0.InIndustrie 4.0(pp. 91-98).Springer Specialties Wiesbaden. Jentzsch, N. (2016).Competition policy in digital markets: Should data protection play a role?(No. 94).DIW Roundup: Policy in focus. Kleineidam, G., Schmid, LJ, Krasser, M., Koch, B. (2017).Critical infrastructure security requirements for information and communication technology from the perspective of a utility company.e i Electrical Engineering and Information Technology,134(1), 3-13. Kubicek, H., Diederich, G. (2015).Online banking in comparison.InSecurity in Online Banking(pp. 7-19).Springer Specialties Wiesbaden. Lanfer, J. (2017).Cyber-security and the (impotence) power of the state.Insecurity production between state, market and civil society(pp. 47-72).Springer Specialties Wiesbaden. Reuter, C. (2015).Operational Continuity Management in Small and Medium Business Smart Services for Industry 4.0.Mensch und Computer 2015-Workshopband. Schaumller-Bichl, I., Kolberger, A. (2016).Information Security Risk Analysis in complex systems-new challenges and solutions.InGI anniversary(pp. 609-617). Schneider, F. (2017).Reporting requirements in IT security law.Nomos publishing company mbH Co. KG. Silva, KC, Rocha, AA, Guimaraes, FQ (2016, May).Trust in the Cloud from the Sec-SLA in various models as deployment and service.InProceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era Volume 1(pp. 329-336).Brazilian Computer Society. Stupka, V., Hork, M., Husk, M. (2017, August).Protection of personal data in security alert sharing platforms.InProceedings of the 12th International Conference on Availability, Reliability and Security(p.65).ACM. Unger, WJ (2014).Cyber Defense - a national challenge.S F Security and Peace,32(1), 8-16. Weber, A., Weber, D. (2015, December).Governance of critical information technology in open networks.InResponsible Innovation(pp. 151-164).Nomos publishing company mbH Co. KG. Witt, T., Freudenberg, P. (2016).NIS policy.Computer and Law,32(10), 657.