diff --git a/progress/1_Chapter1.tex b/progress/1_Chapter1.tex
index 601a1bde1ca0ee41ce07b81173b681531116940e..99732cedfeed87ddb49bfb28ac04bb003c8d7d3e 100644
--- a/progress/1_Chapter1.tex
+++ b/progress/1_Chapter1.tex
@@ -3,11 +3,11 @@
 %% ---------------------------------------------------------------- 
 \chapter{Project Description} \label{Chapter:one}
     \section{Project Overview}
-        There are hundreds of cyber security compliance standards, and many businesses require their partners to comply with numerous and varied [specifications]. Cyber supply chain risk management (CSCRM) differs from cyber security, by means of gaining a higher degree of governance over the company in question, and also over its extended enterprise partners, such as all its suppliers and customers. Whereas cyber security only considers security of a technical nature, CSCRM attempts to encompass both managerial and human factors in preventing risks from disrupting IT systems\textquoteright\ operations. \cite{CSCRM} Keeping track of each company\textquoteright s compliance to a particular standard is a lengthy and potentially expensive task since it can be very difficult to maintain without the use of an external service or consultant.
-
-        Most SMEs will not be able to afford this - due to the time and experience level required, it is unlikely to be something a system administrator will be able to do on top of their other responsibilities, and a consultant will, in all likelihood, be too expensive.
+        Many businesses require their partners to comply with numberous and varied cyber security compliances, of which there are literally hundreds. Cyber supply chain risk management (CSCRM) differs from cyber security, by gaining a higher degree of governance over the company in question, and over its extended enterprise partners, such as all its suppliers and customers. Whereas cyber security only considers security of a technical nature, CSCRM attempts to encompass both managerial and human factors in preventing risks from disrupting IT systems\textquoteright\ operations. \cite{CSCRM}
+        
+        Keeping track of each company\textquoteright s compliance to a particular standard is a lengthy and potentially expensive task since it can be very difficult to maintain without the use of an external service or consultant. Due to the time and experience level required, it is unlikely to be something a system administrator will be able to do on top of their other responsibilities, and a specialist will, in all likelihood, be too expensive for most SMEs.
 
     \section{Project aim}
         An automatically generated cyber security compliance engine, could provide a low cost, time efficient solution for businesses that need a flexible, customisable way of tracking their partner\textquoteright s compliance - or their own compliance - with multiple standards.
 
-        The goal of this project is to create a client-server system that will generate and store compliance forms for the end-user. The forms will be automatically generated via an interface on the application by a user, and accessible by \textquoteleft partners\textquoteright. Partners will be other users that can be added by the primary user, much like friends or followers on a social media application. Users will be able to update the forms\textquoteright\ parameters, and partners able to update their answers to the forms, at a later date. This project is a cloud-based application, and it will deal with cyber security compliance only - no other forms of compliance will be within the scope of this project.
+        The goal of this project is to create a client-server system that will generate and store compliance forms for the end-user. The forms will be automatically generated via an interface on the application by a user, and accessible by \textquoteleft partners\textquoteright. Partners will be other users that can be added by the primary user, much like friends or followers on a social media application. Users will be able to update the forms\textquoteright\ parameters, and partners will be able to update their answers to the forms, at a later date. This project is a cloud-based application, and it will deal with cyber security compliance only - no other forms of compliance will be within the scope of this project.
diff --git a/progress/2_Chapter2.tex b/progress/2_Chapter2.tex
index f93d6f8b36622c7722a406da730281bd2d856afd..ac1eb94a85ddf4443f113a390dc1ab8ab0eed7c0 100644
--- a/progress/2_Chapter2.tex
+++ b/progress/2_Chapter2.tex
@@ -18,13 +18,13 @@
         Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. \cite{CSCRM}
 
     \subsection{Compliance in Cyber Security}
-        Cyber security standards have existed for a long time, affecting the necessary policies and practices of individuals and organisations over the last several decades. \cite{StanfordConsortium} Various legislation and regulations often struggle to keep up with the latest cyber threats due the rapid evolution of the field. \cite{GDPR} As a result of the expanding pool of available tools, there is an ever-increasing number of people able to access the world of cyber crime. This makes it all the more crucial that conforming to the latest standards becomes an imperative for every company, regardless of the size of each enterprise. The hope for this project is that it will enable organisations to achieve this in a cost effective manner.
+        Cyber security standards have existed for a long time, affecting the necessary policies and practices of individuals and organisations over the last several decades. \cite{StanfordConsortium} Various legislation and regulations often struggle to keep up with the latest cyber threats due to the rapid evolution of the field. \cite{GDPR} As a result of the expanding pool of available tools, there is an ever-increasing number of people able to access the world of cyber crime. This makes it all the more crucial that conforming to the latest standards becomes an imperative for every company, regardless of the size of each enterprise. The hope for this project is that it will enable organisations to achieve this in a cost effective manner.
 
 
 \section{The State of Compliance in the UK}
 
     \subsection{Cyber Essentials}
-        The UK Government worked with the Information Assurance for Small and Medium Enterprises (IASME) consortium and the Information Security Forum (ISF) to develop Cyber Essentials, a set of basic technical controls to help organisations protect themselves against common online security threats. \cite{CyberEssentials} The scheme is design to prevent unskilled individuals from being able to find basic vulnerabilities in an organisation, by providing advice and 2 levels of certification; \textquotedblleft Cyber Essentials\textquotedblright\ and \textquotedblleft Cyber Essentials Plus\textquotedblright. The former is a self-assessment designed to be light-weight and easy to follow, the latter is similar, but the verification of the organisation\textquoteright s cyber security is carried out by a certification body instead of the organisation itself.
+        The UK Government worked with the Information Assurance for Small and Medium Enterprises (IASME) consortium and the Information Security Forum (ISF) to develop Cyber Essentials, a set of basic technical controls to help organisations protect themselves against common online security threats. \cite{CyberEssentials} The scheme is designed to prevent unskilled individuals from being able to find basic vulnerabilities in an organisation by providing advice and 2 levels of certification; \textquotedblleft Cyber Essentials\textquotedblright\ and \textquotedblleft Cyber Essentials Plus\textquotedblright. The former is a self-assessment designed to be light-weight and easy to follow, and the latter is similar, but the verification of the organisation\textquoteright s cyber security is carried out by a certification body instead of the organisation itself.
 
     \subsection{Crime}
         We have seen a significant increase in cyber criminal activity in recent years. The methods used by criminals are currently changing as businesses begin to be targeted more frequently than individuals. Cyber crime is growing at a rapid rate, making it increasingly troublesome for regulations and legislation to keep pace, resulting in outdated laws that are often unfit for purpose. \cite{GDPR}
diff --git a/progress/master.pdf b/progress/master.pdf
index 07830bf1dfc34fd4af8f833caeed07100e542932..f435d0be542481f71cfe2dfdf71cb28ead117b29 100644
Binary files a/progress/master.pdf and b/progress/master.pdf differ