Research Article

Creating and Implementing an Effective and Deterrent National Cyber Security Strategy

Figure 4

National power elements.