References:Cebula, J., Popeck, M. and Young, L. (2014). A Taxonomy of Operational Cyber SecurityRisks. Version 2. Retrieved fromon18 April, 2019Depillis, L. and Sherman I. (2019). Amazon’s Extraordinary Evolution: A Timeline.Retrieved from-timeline/index.htmlon 18 April, 2019NIST Cybersecurity Framework (CSF) Reference Tool. (2014). Retrieved fromon 18 April, 2019Prime Indexes. (2019). Cyber-security Industry Review. Retrieved fromon 18 April,2019Riedy, M. & Hanus, B. (2017). It is Just Unfair Using Trade Laws to “Out” SecuritySoftware Vulnerabilities.Loyola University Chicago Law Journal, 48, pgs.1099-1134.Retrieved from-4/12_Riedy%20(1099-1134)%20CROP.pdfon 18 April, 2019The Wall Street Journal. (2019). Amazon.com Inc. Retrieved fromon 18 April, 2019Upguard. (2016). What is Upguard? Retrieved from-is-upguardon 18 April, 2019