Andreasson, K.J. (2011). Cybersecurity: Public sector threats and responses. Taylor & Francis Group. Read Chapter 6 – U.S. Federal Cybersecurity Policy. This chapter discusses the various federal cybersecurity threats, organizational and policy issues that persist over time.
Frulinger, J. (2020, April 15). Understanding the frameworks, methodologies, and tools to help you identify, quantify, and prioritize the threats you face. This article defines threat modeling, provides data flow diagram examples, and the steps used in applying the most common threat modeling methodologies.
The resources below are highly suggested, optional readings that will help you with this week’s assignments.
The Information Technology Information Sharing and Analysis Center. (n.d.). In the news. The IT-ISAC website is an officially sanctioned source of information for IT departments in important government and enterprises by the FBI, Critical Infrastructure areas defined by DHS, and InfraGard. Focus on the news articles listed at the top of the current year column to get the latest news in the field of cybersecurity. This website is a valuable tool as a reference.
Carol A. Siegel, & Mark Sweeney. (2020). Cyber Strategy: Risk-Driven Security and Resiliency. Auerbach Publications. This e-book describes cybersecurity strategies using several industry-standard frameworks discussed in this class. Some of the topics detailed are cyber risks and controls, current and target statement assessments, and measuring cybersecurity plan performance. This e-book is a valuable tool to have as a reference and specific chapters are valuable resources for the weekly assignments.
Patrick, C. (2019). Debugging the Tallinn manual 2.0’s application of the due diligence principle to cyber operations. Washington International Law Journal, 28(2), 581–604. This article explains the importance of due diligence in a global cyber world that exponentially enhances the threat landscape. The authors deconstruct the guidelines outlined in the Tallinn Manual 2.0 concerning territory and how international law applies to due diligence.