Critical Resources

  • Abu, M. S., Selamat, S. R., Ariffin, A., & Yusof, R. (2018). Cyber threat intelligence–issue and challenges. Indonesian Journal of Electrical Engineering and Computer Science, 10(1), 371-379.
  • Ajankar, S. S., & Nimodiya, A. R. (2021). Cyber Security: Techniques and Perspectives on Transforming-A Review.
  • Aldawood, H., & Skinner, G. (2019). Contemporary Cyber Security Social Engineering Solutions, Measures, Policies, Tools and Applications: A Critical Appraisal. International Journal of Security , 11. From Contemporary Cyber Security Social Engineering Solutions, Measures, Policies, Tools and Applications: A Critical Appraisal : https://f.hubspotusercontent30.net/hubfs/8156085/WhitePaper%20-%20IJS%20-%20Contemporary%20Cyber%20Security%20Social%20Engineering%20Solutions[1].pdf
  • Ammann, P., Wijesekera, D., & Kaushik, S. (2002, November). Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 217-224).
  • Boyd, A. (2018, March). It Takes More Than Tech Skills To Be a Strong Cyber Leader. NextGov. Retrieved on November 7, 2022 from https://www.nextgov.com/cybersecurity/2018/03/it-takes-more-tech-skills-be-strong-cyber-leader/146520/ 
  • Davidson, R. (2021). The fight against malware as a service. Network Security, 2021(8), 7-11.
  • Hawkins, S. M., Yen, D. C., & Chou, D. C. (2000). Disaster recovery planning: a strategy for data security. Information management & computer security.
  • Information Systems Audit and Control Association. (2022). Become a Strategic Industry Leader. Credentialing/CISM. Retrieved on December 1, 2022 from https://www.isaca.org/credentialing/cism
  • ISO Guide. 73: 2009. (2009). Risk management vocabulary: International Organization for Standardization. https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en
  • K Micro. (June 13, 2019). Managed IT Services. In-House Vs. Outsourcing IT: How to Make the Right Choice for Your Business. Retrieved on November 26, 2022 from https://kmicro.com/in-house-vs-outsourcing-it/
  • Kutsman, V. (2023). Distributed file system based on a relational database. Open Journal of Applied Sciences, 13(05), 643–658. https://doi.org/10.4236/ojapps.2023.135051
  • Lockheed Martin. (2023). The Cyber Kill Chain. Retrieved on February 26, 2023 from https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
  • Moşteanu, N. R. (2020). Challenges for organizational structure and design as a result of digitalization and cybersecurity. The Business & Management Review, 11(1), 278-286.
  • Moore, T., Dynes, S., & Chang, F. R. (2015). Identifying how firms manage cybersecurity investment. Available: Southern Methodist University. Available at: http://blog. smu.edu/research/files/2015/10/SMU-IBM. pdf (Accessed 2015-12-14), 32.
  • Patel, A., Ghaghda, S., & Nagecha, P. (2014, March). Model for security in wired and wireless network for education. In 2014 International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 699-704). IEEE.
  • Pătrașcu, P. (2019). Promoting cybersecurity culture through education. In Conference proceedings of» eLearning and Software for Education «(eLSE) (Vol. 15, No. 02, pp. 273-279). Carol I National Defence University Publishing House.
  • Reich, B. H., & Nelson, K. M. (2003). In their own words: CIO visions about the future of in-house IT organizations. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 34(4), 28-44.
  • Richardson, M. D., Lemoine, P. A., Stephens, W. E., & Waller, R. E. (2020). Planning for Cyber Security in Schools: The Human Factor. Educational Planning, 27(2), 23-39.
  • Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, J. C., Meneely, A., & Williams, L. (2018). Attack surface definitions: A systematic literature review. Information and Software Technology, 104, 94-103.
  • University of Waterloo. (2018). ISO Project Management Office, Risk Responses, https://uwaterloo.ca/ist-project-management-office/risk-responses
  • Yang, S. J., Holsopple, J., & Sudit, M. (2006, October). Evaluating threat assessment for multi-stage cyber attacks. In MILCOM 2006-2006 IEEE Military Communications conference (pp. 1-7). IEEE.