Files
amILearningEnough/docs/resources/operatingSystem/securityThreatsAndAttacks.md
2024-12-21 01:23:20 +05:30

2.7 KiB

Security Threats and Attacks

Official Documentation

  • NIST Computer Security Resource Center
  • OWASP (Open Web Application Security Project)
  • US-CERT (United States Computer Emergency Readiness Team)
  • MITRE ATT&CK Framework

Research Papers

  • "A Survey of Coordinated Attacks and Collaborative Intrusion Detection" by F. Gong (2003)
  • "A Survey of Insider Attack Detection Research" by M. Salem et al. (2008)
  • "A Survey of Botnet and Botnet Detection" by M. Feily et al. (2009)

Additional Online Resources

  • Cybersecurity & Infrastructure Security Agency (CISA) Resources
  • SANS Internet Storm Center
  • Krebs on Security

Books

  • "The Art of Attack: Attacker Mindset for Security Professionals" by Maxie Reynolds
    • ISBN: 1119805465
    • Provides insights into the mindset and strategies of attackers to help defenders improve their security posture.
  • "Threat Modeling: Designing for Security" by Adam Shostack
    • ISBN: 1118809998
    • Offers a comprehensive approach to identifying and mitigating potential security threats in system design.
  • "Hacking: The Art of Exploitation" by Jon Erickson
    • ISBN: 1593271441
    • Explores various hacking techniques and attacks, providing a deep understanding of how they work.
  • "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws" by Dafydd Stuttard and Marcus Pinto
    • ISBN: 1118026470
    • Focuses on web application security, covering a wide range of attacks and defense strategies.

Standards

  • ISO/IEC 27001:2013 Information Security Management
    • Provides requirements for an information security management system (ISMS)
  • NIST Special Publication 800-53 Security and Privacy Controls for Information Systems and Organizations

Online Courses

  • Coursera: Cybersecurity Specialization by University of Maryland
  • edX: Cybersecurity Fundamentals
  • Udacity: Security Analyst Nanodegree