Cybersecurity information technology list

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The general public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

Cybersecurity is a major endeavor of the IT industry. There are a number of professional certifications given for cybersecurity training and expertise.[1] Although billions of dollars are spent annually on cybersecurity, no computer or network is immune from attacks or can be considered completely secure. The single most expensive loss due to a cybersecurity exploit was the ILOVEYOU or Love Bug email worm of 2000, which cost an estimated 8.7 billion American dollars.[2]

This article attempts to list all of the important Wikipedia articles about cybersecurity. There are a number of minor articles that can be reached by means of links in the listed articles.

References

  1. "CompTIA Career Roadmap". CompTIA. Retrieved 20 Aug 2019.
  2. Ciampia, Mark (2018). Security+ Guide to Network Security Fundamentals. Cengage. ISBN 978-1337288781.
  3. Stallings & Brown (2017). Computer Security: Principles and Practice (4 ed.). Pearson. ISBN 978-0134794105.
  4. Stallings, William (1995). Network and Internetwork Security: Principles and Practice. IEEE Press. ISBN 0-7803-1107-8.
  5. The Open University (2016). Network security. Kindle.
  6. Merkow & Breithaupt (2014). Information Security: Principles and Practice (2 ed.). Pearson. ISBN 978-0789753250.
  7. Stallings, William (2016). Cryptography and Network Security (7th ed.). Pearson. ISBN 978-0134444284.
  8. Kahn, David (1967). The Code Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner. ISBN 0-684-83130-9.
  9. Fridrich, Jessica (2009). Steganography in Digital Media. Cambridge. ISBN 978-0521190190.
  10. Macrakis, Kristie (2014). Prisoners, Lovers, and Spies: The Story of Invisible Ink from Herodotus to Al-Qaeda. Yale University Press. ISBN 978-0300179255.
  11. Kao, I Lung (2019). Effective and Efficient Authentication and Authorization in Distributed Systems. University of Florida. ISBN 978-0530003245.
  12. ICT School (2019). Hacking Tools for Computers. ICT School. ISBN 9781088521588.
  13. Diogenes & Ozkaya (2018). Cybersecurity--Attack and Defense Strategies. Packt Publishing. ISBN 978-1-78847-529-7.
  14. Andes, Thomas. The Encyclopedia of Computer Security Exploits. ISBN 9781530944682.
  15. Britz, Marjie (2013). Computer Forensics and Cyber Crime (3 ed.). Pearson. ISBN 978-0132677714.
  16. Kaplan, Fred (2016). Dark Territory: The Secret History of Cyber War. Simon & Schuster. ISBN 978-1476763262.
  17. Lopez & Setola (2012). Critical Infrastructure Protection. Springer-Verlog. ISBN 978-3642289194.
  18. Stewart, Michael (2013). Network Security, Firewalls, and VPNs (2 ed.). James & Bartlett Learning. ISBN 978-1284031676.
  19. Grasser, Michael (2008). Secure CPU: A Secure Processor Architecture for Embedded Systems. VDM Verlag. ISBN 978-3639027839.
  20. Jacobs & Rudis (2014). Data-Driven Security. Wiley. ISBN 978-1118793725.
  21. Campbell, T. (2016). Practical Information Security Management: A Complete Guide to Planning and Implementation. APress. ISBN 9781484216859.
  22. Calder, Alan. NIST Cybersecurity Framework: A Pocket Guide. IT Governance Publishing Ltd. ISBN 978-1787780422.
  23. Alsmatti, Izzat (2019). The NICE Cybersecurity Framework. Springer. ISBN 978-3030023591.
  24. NIST. "Framework for Improving Critical Infrastructure Cybersecurity v1.1" (PDF). NIST. Retrieved 19 Aug 2019.
  25. NIST. "Cybersecurity Framework Page". NIST. Retrieved 19 Aug 2019.
  26. NIST. "NIST SP 800-181: NICE Cybersecurrity Workforce Framework" (PDF). NIST. Retrieved 19 Aug 2019.
  27. U.S. Congress. "Cybersecurity Enhancement Act of 2014". U.S. Congress. Retrieved 19 Aug 2019.
  28. Center for Internet Security. CIS Controls V7.1.
  29. NIST. Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations (PDF).
  30. Talabis & Martin (2013). Information Security Risk Assessment Toolkit. Syngress. ISBN 978-1597497350.
  31. ISACA. The Risk IT Practitioner Guide.
  32. Kosseff, Jeff (2017). Cyber Security Law. Wiley. ISBN 978-1119231509.
  33. Taylor, Laura (2013). FISMA Compliance Handbook (2 ed.). Elsevier. ISBN 978-0124058712.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.