This week, our Resource List of the Week concentrates on Cybersecurity. Before starting, let’s give a definition to this topic.
What is Cyber Security?
According to the SearchSecurity,
“Cybersecurity is the protection of Internet-connected systems, including hardware, software and data, from cyber attacks.”
To better understand the topic, we recommend you read the following titles and resources.
Cybersecurity is more essential today than ever, not just in the workplace but at home too. This book describes various types of cyber threat explaining what people can do to mitigate these risks and keep their data secure.
This text, derived from research, places security management in a holistic context, outlining how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. This is a unique title that integrates highly specialized materials understandableby everyone, including non-specialists.
This research-based, unique book contains insights from experts who do not normally release information into the public arena. The text is a useful resource for managers and government agencies, explaining how organizational learning and training can be utilized to develop a culture that protects companies from attacks. Finally, the authors outline that the speed and complexity of cyber-attacks demand a different approach to security management. Therefore, the book includes scenario-based planning and training to supplement security policies and technical protection systems.
This text provides references and tutorials on the capabilities related to modern cybersecurity engineering. Firstly, the authors bring together comprehensive best practices for building software systems that exhibit superior operational security. Then, it gives suggestions for considering security throughout the full system development and acquisition lifecycles. Finally, the book introduces seven core principles of software assurance showing how to apply them coherently and systematically.
This book outlines scientific methods for generating impactful knowledge, validating theories, and adding critical rigour to the cybersecurity field. Firstly, it shows how to develop a research plan; then, it delineates useful research methodologies for cybersecurity study: observational, mathematical, experimental, and applied. Finally, each research method chapter concludes with recommended outlines and suggested templates for submission to peer-reviewed venues.
This webpage is a collection of cybersecurity resources along with helpful links to the SANS websites, content and free resources.
This website hosts information about professional associations, educational opportunities, certifications and social media contacts, useful to anyone involved in Cyber Security.
This video shows a Ted Talk byNick Espinosa, an expert in cybersecurity and network infrastructure.