Critical Resources
- Ahlborg, A. (2021, June 13). How mail components on the server side detects and process undesired emails: a systematic literature review. Retrieved from https://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1576516&dswid=-1102
- Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939-953.
- Anigbogu, G. N., Chinagolum, I., Anigbogu, S. O., & Anigbogu, K. S. (2021). CLOUD DEPLOYMENT MODELS FOR RESILIENCE INTERNET DISASTER RECOVERY: A REVIEW.
- Biesta, G. (2009). Good education in an age of measurement: On the need to reconnect with the question of purpose in education. Educational Assessment, Evaluation and Accountability (formerly: Journal of Personnel Evaluation in Education), 21(1), 33-46.
- Courcier, Scar de. (2018). AXIOM 2.5 From Magnet Forensics. Forensic Focus. Retrieved on June 4, 2023 from https://www.forensicfocus.com/reviews/axiom-2-5-from-magnet-forensics/
- Dargahi, T., Dehghantanha, A., Bahrami, P. N., Conti, M., Bianchi, G., & Benedetto, L. (2019). A Cyber-Kill-Chain based taxonomy of crypto-ransomware features. Journal of Computer Virology and Hacking Techniques, 15, 277-305.
- Gibson, D., & Igonor, A. (2018). Mitigating risk with a computer incident response plan. [Third Edition]. Jones & Bartlett Learning.
- Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering, 45, 3171-3189.
- Kolb, R. W. (Ed.). (2018). The Sage encyclopedia of business ethics and society. Sage Publications.
- Limniotis, K. (2021). Cryptography as the Means to Protect Fundamental Human Rights. Cryptography, 5(4), 34. Retrieved from https://www.mdpi.com/2410-387X/5/4/34
- Lutkevich, Ben. (2021). computer forensics (cyber forensics). TechTarget. Retrieved on May 21, 2023 from https://www.techtarget.com/searchsecurity/definition/computer-forensics
- Moore, Michelle. (July 27, 2022). Top Cyber Security Certifications: Which Ones Are Right for You? University of San Diego. Retrieved on December 3, 2022 from https://onlinedegrees.sandiego.edu/is-a-cyber-security-certification-right-for-you/
- Moyle, E., Kelley, D. (2020). Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects. Packt Publishing Ltd.
- Open Web Application Security Project (OWASP). (2023). OWASP Data Security Testing Guide v1.1. Retrieved from https://www.owasp.org/
- OConnor, T. J. (2022, February). HELO DarkSide: Breaking Free From Katas and Embracing the Adversarial Mindset in Cybersecurity Education. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education V. 1 (pp. 710-716).
- Pandey, A. K., Tripathi, A. K., Kapil, G., Singh, V., Khan, M. W., Agrawal, A., … & Khan, R. A. (2020). Current challenges of digital forensics in cyber security. Critical Concepts, Standards, and Techniques in Cyber Forensics, 31-46.
- PCI Standard Council (2018). PCI DSS Quick Reference Guide; Understanding the Payment Card Industry Data Security Standard version 3.2.1. Retrieved from https://listings.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf
- Pătrașcu, P. (2019). Promoting cybersecurity culture through education. In Conference proceedings of» eLearning and Software for Education «(eLSE) (Vol. 15, No. 02, pp. 273-279). Carol I National Defence University Publishing House.
- Penney, Jonathon, and Bruce Schneier. “Platforms, Encryption, and the CFAA: The CAse of Whatsapp v. NSO Group.” Berkeley Technology Law Journal 36, no. 1 (2021).
- Project Management Institute (PMI). (2017). A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Sixth Edition. Newtown Square, PA: Project Management Institute.
- Renaud, K., & Ophoff, J. (2021). A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs. Organizational Cybersecurity Journal: Practice, Process and People, 1(1), 24-46.
- SANS Institute. (2023). Information Security Reading Room Security Architecture. Retrieved from https://www.sans.org/nice-framework/security-provisionals/
- Schreider, Tari. Building an Effective Cybersecurity Program, 2nd Edition, Rothstein Associates, Incorporated, 2019.
- Sherwood, Clark, & Lynas (2005). Enterprise security architecture: A business-driven approach (1st edition). CRC Press.
- Stallings, W. (2020). Cryptography and network security: Principles and practice (8 ed.). Pearson.
- Zakaria, K. N., Othman, S. H., & Zainal, A. (2019, December). Review of cybersecurity audit management and execution approaches. In 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE.