Laszka, A., Johnson, B., & Grossklags, J. (2018). On the Assessment of Systematic Risk in Networked Systems. ACM Transactions on Internet Technology (TOIT) - Special Issue on Computational Ethics and Accountability, Special Issue on Economics of Security and Privacy and Regular Papers, 18(4), 1–28. https://doi.org/10.1145/3166069 This resource presents a good overview of the risk that networked systems present to an overall enterprise environment.
Bartlett, N. (2021). Honing in on Hardware: Data Security Concerns of Large Companies. University of Toledo Law Review, 52(4), 545–568. This resource is important because it discusses how large companies struggle to secure their data on vulnerable hardware. It covers the consequences of data breaches, their costs, and the responsibilities of ensuring hardware security.
Dodson, D., Souppaya, M. & Scarfone, K. (2020, April). Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF). National Institutes of Standards and Technology.