Module 5 Cybersecurity Resources
The following links provide additional resources of various types and lengths for you to explore on your own and to your liking for a more extensive look at Cybersecurity.
TOP 10 RECOMMENDED RESOURCES
- Videos:
- 5 TED Talks on Cybersecurity Links to an external site., ted.com
- How cyberattacks threaten real-world peace Links to an external site. by Guy-Philippe Goldstein, TEDxParis 2010
- Professor of Cybersecurity Sadie Creese Links to an external site. of the University of Oxford
- In this 14 minute video
Links to an external site.
Professor Creese talks about the increasing vulnerability of computer systems and the steps necessary to protect them.
- This video is from Futurefest 2013: Shaping Things to Come Links to an external site. (London Conference).
- What will be the biggest threats in the next 10 years? Links to an external site. from NATO Reivew
- World industry leaders discuss what they believe to be the prominent future threats to security.
- Articles & Reports:
- 10 Ways to ‘Fix’ Cybersecurity Links to an external site. (2014) by Kashmir Hill, Forbes
- Top Security Technologies for 2014 and Safety of the Future Links to an external site. (2014) by
- From Gartner Links to an external site., an information technology research and advisory company
- The 5 Biggest Cybersecurity Myths, Debunked Links to an external site. (2014) by Peter W. Singer & Allan Friedman, Wired
- Websites:
- Center for International Security and Cooperation Links to an external site. and Cybersecurity Links to an external site. Research, Stanford University
- Krebs on Security Links to an external site. by blogger Brian Krebs Links to an external site. (in-depth security news and investigation)
- SANS Information Security Resources Links to an external site. - has articles, webcasts, newsletters, blogs, whitepapers, and more
- Steven Northcutt’s Security Laboratory Links to an external site.: predictions and trends for computer security
ADDITIONAL SUGGESTED RESOURCES
Books:
- Cybersecurity and Cyberwar: What Everyone Needs to Know Links to an external site. (2013) by Peter W. Singer and Allan Friedman
- Cyber War: The Next Threat to National Security and What to Do About It Links to an external site. (2010) by Richard A. Clarke and Robert K. Knake
- Secrets & Lies: Digital Security in a Networked World Links to an external site. (2004) by Bruce Schneier
- Popular cybersecurity books from Goodreads Links to an external site.
Videos and Infographics:
- Seven Cybersecurity Myths Busted Links to an external site. - an infographic from Symantec
- Why Privacy Matters.
Links to an external site.
- Glenn Greenwals
- Cybersecurity in Focus 2012 Links to an external site. - an infographic from govloop and Symantec
- This infographic shows "current trends in cyber security at the federal level, adoption of emerging technology and steps to stay secure" (see their list of resources used at the bottom of the infographic).
- Cracking Stuxnet, a 21st-Century Cyber Weapon Links to an external site. by Ralph Langner, TED2011
- Ralph Langner and team helped crack the code that revealed this digital warhead's final target.
Articles & Reports:
- A Few Questions for Peter W. Singer About the Future of Cybersecurity Links to an external site. by Paul Adams, Popular Science
- Automating Cybersecurity Links to an external site. (2014) by Kenneth Chang, The New York Times
- Cybersecurity: Authoritative Reports and Resources, by Topic Links to an external site. (2014) by Rita Tehan, Congressional Research Service
- Facebook Knows Everything About You, And If You Don't Believe Us Here's Proof Links to an external site. (2014) by Taylor Casti, The Huffington Post TECH
- A marketing stunt for the Ubisoft game "Watch Dogs" is inadvertently allowing users to check how well they've set up their Facebook privacy settings."
- "The campaign, called "Digital Shadow" Links to an external site., which currently is available only in the US, requests permission to access a user's [Facebook] account and then pulls information [from it] to build a comprehensive dossier of the user."
- Hackers Tell Car Makers: Secure Your Vulnerable Vehicles Now
Links to an external site. (2014) by Thomas Brewster, Forbes
- Improving Critical Infrastructure Cybersecurity Links to an external site. (2014), U.S. President Executive Order 13636, from The National Institute of Standards and Technology (NIST)
- A set of industry standards and best practices to help organizations manage cybersecurity risks.
- McAfee Labs 2014 Threats Predictions Links to an external site. - A report on cyber threats from McAfee Labs: An Intel Company
- Quantum Computers Challenge Cybersecurity Links to an external site. (2014) by Dr. Tom Stace, theoretical physicist in the School of Mathematics and Physics at the University of Queensland, ABC Science: Analysis & Opinion
- Symantec's 2014 Internet Security Threat Report, Vol. 19 Links to an external site. and Appendix Links to an external site. of Supplemental Data
- This report "provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape."
- The Real Story of Stuxnet Links to an external site.: How Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program (2013) by David Kushner, from IEEE Spectrum (Institute of Electrical and Electronics Engineers)
- Threatsaurus: The A-Z of computer and data security threats Links to an external site., by Sophos Links to an external site. in collaboration with the Center for Internet Security
- Top 10 Things Cybersecurity Professionals Need To Know About the Internet of Everything Links to an external site. (2014) by Marc Solomon, SecurityWeek, Internet and Enterprise Security News, Insights & Analysis
- United States Department of Homeland Security Publications Links to an external site. on cyber threats and related topics
- From US-CERT (United States Computer Emergency Readiness Team)
- What Are You Revealing Online? Much More Than You Think. Links to an external site. (2014) by Thu-Huong Ha, from ideas.ted.com Links to an external site.
- White hats to the rescue: Law-abiding hackers are helping businesses to fight off the bad guys Links to an external site. (2014), The Economist: Cyber-security
- Why Privacy Matters Even if You Have 'Nothing to Hide' Links to an external site. (2011) by Daniel J. Solove, from The Chronicle of Higher Education, The Chronicle Review
- Council on Cybersecurity Links to an external site. - an independent, expert, not-for-profit global organization working for the security of the Internet.
- Cyberspace2025 Links to an external site.: Today’s Decisions, Tomorrow’s Terrain by David Burt, Aaron Kleiner, J. Paul Nicholas, & Kevin Sullivan, from Microsoft
- Kaspersky Lab Blog Links to an external site. posts numerous news and opinion articles, tips, interviews, and podcasts available in several languages (KasperskyLab is an international IT company headquartered in Moscow, Russia).
- Kaspersky Lab Website: Internet Security Center Links to an external site.
- Real-time Cyberthreat Map Links to an external site.
- SecurityWeek Links to an external site., Internet and Enterprise Security News, Insights & Analysis
- Stop.Think.Connect. Links to an external site. - United States Department of Homeland Security Cybersecurity C Links to an external site.ampaign Links to an external site.
- Symantec's Security Response Team and security research centers around the world "provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam."
- US-CERT: United States Computer Emergency Readiness Team Links to an external site. (Department of Homeland Security)
- What they do Links to an external site.: "leads efforts to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the Nation while protecting the constitutional rights of Americans. US-CERT strives to be a trusted global leader in cybersecurity - collaborative, agile, and responsive in a dynamic and complex environment."
- Report Links to an external site. Incidents, Phishing, Malware, or Vulnerabilities
Conferences:
- Black Hat Links to an external site. (“the most technical and relevant global information security event series in the world” with conferences throughout the world)
- Who they are and what they do Links to an external site.
- Documentation of Research Links to an external site.
- CanSecWest Links to an external site. annual security conference (“the world’s most advanced conference focusing on applied digital security”)
- EUSecWest Links to an external site. annual security conference (“the most significant new discoveries, technologies, and products”)
- PacSec Links to an external site. annual security conference (“provides an opportunity for foreign specialists to be exposed to Japanese innovation and markets and collaborate on practical solutions to computer security issues”)
- RSA Conference Links to an external site.: where the world talks security (“helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia”)
- The Future of Cybersecurity Links to an external site.
- A one-day conference and exhibition in the United Kingdom that “brings you up to date with the latest issues, [and] it also looks ahead to the most pressing security threats of tomorrow"
Cybersecurity Practice Quizzes
(Have some fun - test your knowledge):
- Cybersecurity: Test Your Knowledge, Links to an external site. the network: Cisco’s Technology News Site
-
See how much you know about current cyber threats and then hear insights about the answers
from Bret Hartman, CTO for Cisco's Security Business Group. - How Much Do You Know About Cybersecurity? Links to an external site., The Christian Science Monitor
- Ten questions to gauge your cyber threat knowledge.
- Quiz: Separate Cyber Security Fact from Fiction Links to an external site. by Tim Greene (Network World), CIO.com
- Test your knowledge of cyber attack threats.