"Figure 12-1: Typical Business Scenarios" (page 245), Nayak, U., & Rao, U. H. (2014). The InfoSec handbook: An introduction to information security (1st ed.). APRESS.