Professional Documents
Culture Documents
Adhie, R.P., Hutama, Y., Ahmar, A.S. and Setiawan, M.I., 2018. Implementation
cryptography data encryption standard (DES) and triple data encryption standard (3DES)
method in communication system based near field communication (NFC). In Journal of
Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Abukari, A.M. and Bankas, E.K., 2020. Some cyber security hygienic protocols for
teleworkers in COVID-19 pandemic period and beyond. International Journal of Scientific &
Engineering Research, 11(4), pp.1401-1407.
Alexandra Sava, J., 2022. TCS annual revenue 2013-2022 | Statista. [online] Statista.
Available at: <https://www.statista.com/statistics/759883/india-tcs-annual-revenue/
#:~:text=Tata%20Consultancy%20Services%20(TCS)%20achieved,doubled%20that
%20from%20the%20FY2013.> [Accessed 15 September 2022].
Bada, M. and Nurse, J.R., 2020. The social and psychological impact of cyberattacks.
In Emerging cyber threats and cognitive vulnerabilities (pp. 73-92). Academic Press.
[1]
Connolly, M., 2012. Creating a Campus Based Community Emergency Response Team
(CERT). Community College Journal of Research and Practice, 36(6), pp.448-452.
Dasgupta, P. and Collins, J., 2019. A Survey of Game Theoretic Approaches for Adversarial
Machine Learning in Cybersecurity Tasks. AI Magazine, 40(2), pp.31-43.
Diesch, R., Pfaff, M. and Krcmar, H., 2020. A comprehensive model of information security
factors for decision-makers. Computers & Security, 92, p.101747.
DNA India. 2017. Irdai asks insurers to appoint data security officer by April 30. [online]
Available at: <http://www.dnaindia.com/money/report-irdai-asks-insurers-to-appoint-data-
securityofficer-by-apr-30-2391043> [Accessed 15 September 2022].
Dutt, V., Ahn, Y.S. and Gonzalez, C., 2013. Cyber situation awareness: modeling detection
of cyber attacks with instance-based learning theory. Human Factors, 55(3), pp.605-618.
Dawson, J. and Thomson, R., 2018. The future cybersecurity workforce: going beyond
technical skills for successful cyber performance. Frontiers in psychology, 9, p.744.
Fadilpasic, S., 2016. Running old operating systems means risking a lot, says Duo Security.
[online] ITProPortal. Available at: <https://www.itproportal.com/news/running-old-
operating-systems-means-risking-a-lot-says-duo-security/> [Accessed 13 September 2022].
Gao, H.Y., Hu, A.H., Shen, W.Q. and Jiang, Z.X., 2019. Group consensus of multi-agent
systems subjected to cyber-attacks. Chinese Physics B, 28(6), p.060501.
Gill, P., 2019. TCS was hacked for its clients by China’s cyber spy campaign: Report.
[online] Business Insider. Available at: <https://www.businessinsider.in/tcs-hacked-and-data-
leaked-to-chinas-operation-cloud-hopper/articleshow/69969506.cms#:~:text=The%20Indian
%20IT%20giant%2C%20Tata,access%20to%20their%20client's%20networks.> [Accessed
13 September 2022].
GOV.UK. 2016. New figures show large numbers of businesses and charities suffer at least
one cyber attack in the past year. [online] Available at:
<https://www.gov.uk/government/news/new-figures-show-large-numbers-of-businesses-and-
charities-suffer-at-least-one-cyber-attack-in-the-past-year> [Accessed 13 September 2022].
Joshi, R., Goel, R. and Garg, S., 2019. A Study on Customers’ Perception on Adoption of
Digital Banking in Indian Banking Sector. SSRN Electronic Journal.
[2]
Kryvinska, N., Strauss, C., Collini‐Nocker, B. and Zinterhof, P., 2011 . Enterprise network
maintaining mobility–architectural model of services delivery. International Journal of
Pervasive Computing and Communications.
Kesharwani, S., Sarkar, M.P. and Oberoi, S., 2019. Cyber security in India: threats and
challenges. Cybernomics, 1(2), pp.32-34.
Kshetri, N., 2016. Cybercrime and cybersecurity in India: causes, consequences and
implications for the future. Crime, Law and Social Change, 66(3), pp.313-338.
Lawrence, J., 2013. Cyber crime – employees have become one of the biggest risks to a
business. [online] HRZone. Available at: <https://www.hrzone.com/perform/business/cyber-
crime-employees-have-become-one-of-the-biggest-risks-to-a-business> [Accessed 13
September 2022].
Moneylife. 2022. TCS restores its website after hackers put it up for sale. [online] Available
at: <https://www.moneylife.in/article/tcs-restores-its-website-after-hackers-put-it-up-for-
sale/3593.html> [Accessed 13 September 2022].
Mint. 2022. In a significant milestone, TCS now has more than 2 lakh women employees.
[online] Available at: <https://www.livemint.com/companies/news/in-a-significant-
milestone-tcs-women-workforce-tops-2-lakh-11642002463684.html> [Accessed 15
September 2022].
Phadnis, S., 2022. Talent Shortage A Challenge For Mnc Tech Centres: Ey | India Business
News - Times of India. [online] The Times of India. Available at:
<https://timesofindia.indiatimes.com/business/india-business/talent-shortage-a-challenge-for-
mnc-tech-centres-ey/articleshow/89735165.cms> [Accessed 15 September 2022].
Paoli, L., Visschers, J. and Verstraete, C., 2018. The impact of cybercrime on businesses: A
novel conceptual framework and its application to Belgium. Crime, Law and Social
Change, 70(4), pp.397-420.
Rastogi, N.I.T.A.N.K. and Trivedi, M.K., 2016. PESTLE technique–a tool to identify
external risks in construction projects. International Research Journal of Engineering and
Technology (IRJET), 3(1), pp.384-388.
[3]
Süzen, A.A., 2020. A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry
4.0 Ecosystem. International Journal of Computer Network & Information Security, 12(1).
Team, E., 2021. Cyber-attacks can lead to employees getting fired: Here's how - My Siccura
- Private and Secure Digital Life. [online] My Siccura - Private and Secure Digital Life.
Available at: <https://siccura.com/cyber-attacks-can-lead-to-employees-getting-fired-heres-
how/> [Accessed 13 September 2022].
Tata Consultancy Services, 2020. TCS Annual Report 2019-20. TCS Annual Report. [online]
Mumbai: Tata Consultancy Services. Available at:
<https://www.tcs.com/content/dam/tcs/investor-relations/financial-statements/2019-20/ar/
annual-report-2019-2020.pdf> [Accessed 5 September 2022].
TCS, 2022. TCS Integrated Annual Report FY 2021-2022. TCS Integrated Annual Report.
[online] Mumbai: TCS. Available at: <https://www.tcs.com/content/dam/tcs/investor-
relations/financial-statements/2021-22/ar/annual-report-2021-2022.pdf> [Accessed 5
September 2022].
Ursillo, S. and Arnold, C., 2019. Cybersecurity Is Critical for all Organizations – Large and
Small. [online] IFAC. Available at: <https://www.ifac.org/knowledge-gateway/preparing-
future-ready-professionals/discussion/cybersecurity-critical-all-organizations-large-and-
small> [Accessed 13 September 2022].
Williams, P.A. and Woodward, A.J., 2015. Cybersecurity vulnerabilities in medical devices:
a complex environment and multifaceted problem. Medical Devices (Auckland, NZ), 8,
p.305.
[4]