Brown, S. (2020). Successful cybersecurity professionals: How to change your behavior to protect your organization. Business Expert Press. Read Chapter 14: Theory of Cybersecurity
This chapter describes various theories used to frame cybersecurity.
Cybersecurity & Infrastructure Security Agency (n.d.). Zero trust maturity model. CISA. This web page provides information about the zero trust maturity model as used to prevent unauthorized access to data and services at a granular level.
Office of Cybersecurity, Energy Security, and Emergency response (n.d.). Cybersecurity capability maturity model (C2M2). Energy.gov. This web page provides information on C2M2, a tool used to evaluate and improve cybersecurity for organizations of all sectors, types, and sizes to evaluate and make improvements to their cybersecurity programs and strengthen their operational resilience.
Office of Cybersecurity, Energy Security, and Emergency response (2021, July). Cybersecurity capability maturity model (C2M2) version 2.0. Energy.gov. This document provides the Cybersecurity Capability Maturity Model (C2M2) that was developed through a collaborative effort between public- and private-sector organizations, sponsored by the United States Department of Energy (DOE), the Electricity Subsector Coordinating Council (ESCC), and the Oil and Natural Gas Subsector Coordinating Council (ONG SCC).
Lewis, J. A. (2018). Rethinking cybersecurity: Strategy, mass effect, and states. Center for Strategic & International Studies. This report explores questions related to imperfect technologies, cybersecurity challenges, cyber operations, and interstate conflict, and assesses the accuracy of our perceptions of cybersecurity.