. Into and . Development-issn, , vol.2

C. M. Darville, Cyber Security Incident Management Guide, 2015.

. Cisa, CISA Cyber Incident Scoring System, Retrieved from Cybersecurity and Infrastructure Security Agency (CISA, 2020.

. Cisa, Cyber Incident Severity Schema. USA: Cybersecurity and Infrastructure Security Agency (CISA), 2020.

J. M. Marszal, Security PHA Review for Consequence-Based Cybersecurity, USA: International Society of Automation, 2019.

T. Limba, T. Pl?ta, K. Agafonov, and M. Damkus, Cyber security management model for critical infrastructure, Entrepreneurship and Sustainability Issues, vol.4, issue.4, pp.559-573, 2017.

M. Beazner and P. R. Zurich, CSS Cyber Defence Hotspot Analysis: Stuxnet. Zurich: Center for Security Studies (CSS), vol.2, 2017.

M. Bhayani and M. P. , Internet of Things (IoT): In a Way of Smart World, Proceedings of the International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol.438, 2016.

. Nato, Cyber Security -Incident Reporting and Response Planning: Implementation Guidance for CIP-008-6. North American Electric Reliability Corporation, 2019.

. Nist, Framework for Improving Critical Infrastructure Cybersecurity. Washington: National Institute of Standards and Technology, 2018.

P. Cichonski and T. M. , NIST Special Publication 800-61 Revision 2: Computer Security Incident Handling Guide, 2012.