Week 1
|
Popescul, D. (2011, June).Â
The confidentiality–integrity–accessibility triad into the knowledge security. A reassessment from the point of view of the knowledge contribution to innovation
. In Proceedings of the 16th international business information management association conference (innovation and knowledge management, a global competitive advantage) (pp. 1338-1345).
Dempsey, K., Pillitteri, V., & Regenscheid, A. (2021).Â
Managing the Security of Information Exchanges
 (No. NIST Special Publication (SP) 800-47 Rev. 1 (Draft)). National Institute of Standards and Technology.
Â
Marks, Cotter, D., Janz, A., Williams, K., & Sinapi, A. E. (2021).Â
CYBERSECURITY AND DATA PRIVACY
. Tort Trial & Insurance Practice Law Journal, 56(2), 303–.
Â
Razaque, Al Ajlan, A., Melaoune, N., Alotaibi, M., Alotaibi, B., Dias, I., Oad, A., Hariri, S., & Zhao, C. (2021).Â
Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System
. Applied Sciences, 11(17), 7880–.
|
|
Week 2
|
Margherita, A., & Heikkilä, M. (2021).Â
Business continuity in the COVID-19 emergency: A framework of actions undertaken by world-leading companies
. Business horizons, 64(5), 683-695.
Â
Swanson, M., Bowen, P., Phillips, A. W., Gallup, D., & Lynes, D. (2010).Â
NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems
. Swanson, P. Bowen, AW Phillips, D. Gallup, D. Lynes.–2010.–149 p, 17.
Â
Marcus Burger, L Murphy Smith, & Justin Wood. (2020).Â
RECENT CYBERCRIMES AND CYBERSECURITY STRATEGIES
. Internal Auditing, 35(1), 12–19.
Â
Bayard. (2019).Â
THE RISE OF CYBERCRIME AND THE NEED FOR STATE CYBERSECURITY REGULATIONS
. Rutgers Computer & Technology Law Journal, 45(2), 69–.
|
|
Week 3
Â
Â
|
BURKE, MCDONALD, J., & AUSTIN, T. (2000).Â
Architectural support for fast symmetric-key cryptography
. Operating Systems Review, 34(5), 178–189.
Â
Diffie, & Hellman, M. (1976).Â
New directions in cryptography
. IEEE Transactions on Information Theory, 22(6), 644–654.
Â
Ullah, de Roode, G., Meratnia, N., & Havinga, P. (2021).Â
Threat Modeling — How to Visualize Attacks on IOTA?
 Sensors (Basel, Switzerland), 21(5), 1834–.
Â
Li, Yu, Y., Lou, C., Guizani, N., & Wang, L. (2020).Â
Decentralized Public Key Infrastructures atop Blockchain
. IEEE Network, 34(6), 133–139.
Â
Chia, Heng, S.-H., Chin, J.-J., Tan, S.-Y., & Yau, W.-C. (2021).Â
An Implementation Suite for a Hybrid Public Key Infrastructure
. Symmetry (Basel), 13(8), 1535–.
|
|
Week 4
|
Ghazal, T. M., Hasan, M. K., Hassan, R., Islam, S., Abdullah, S. N. H. S., Afifi, M. A., & Kalra, D. (2020).Â
Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications
. Solid State Technol, 63(1s), 2513-2521.
Â
Poyraz, Canan, M., McShane, M., Pinto, C. A., & Cotter, T. S. (2020).Â
Cyber assets at risk: monetary impact of U.S. personally identifiable information mega data breaches
. Geneva Papers on Risk and Insurance. Issues and Practice, 45(4), 616–638.
Â
Fausto, Gaggero, G. B., Patrone, F., Girdinio, P., & Marchese, M. (2021).Â
Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures
. Sensors (Basel, Switzerland), 21(21), 6970–.
|
|
Week 5
|
Hokeun Kim, Wasicek, A., Mehne, B., & Lee, E. A. (2016).Â
A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities
. 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 114–122.
Â
Cao, Jiang, X., Zhao, Y., Wang, S., You, D., & Xu, X. (2020).Â
A Survey Of Network Attacks On Cyber-Physical Systems
. IEEE Access, 8, 1–1.
Â
Wang, Sun, L., & Zhu, H. (2020).Â
Defining Social Engineering in Cybersecurity
. IEEE Access, 8, 85094–85115.
Â
Shi. (2020).Â
Computer Network Information Security Protection Based on Virtual Private Network
. Journal of Physics. Conference Series, 1646(1), 12121–.
Â
Figueroa-Lorenzo, Añorga, J., & Arrizabalaga, S. (2019).Â
A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach
. Sensors (Basel, Switzerland), 19(20), 4455–.
Â
Penelova. (2021).Â
Access Control Models
. Cybernetics and Information Technologies : CIT, 21(4), 77–104
|
|
Week 6
|
Caselli, M., & Kargl, F. (2014, October).Â
A security assessment methodology for critical infrastructures
. In International Conference on Critical Information Infrastructures Security (pp. 332-343). Springer, Cham.
Â
Ruan, Y. L., & Yan, X. Q. (2018).Â
Research on key technology of web application security test platform
. DEStech Transactions on Social Science, Education and Human Science, (emss).
Â
External Security Audit Conduct A Detailed Objective Assessment Of Security Of Facilities And Buildings, Including Vital Installations At Landside Area Of The Kiab Airport Including But Not Limited To The Present Security Measures & Procedures And Conting
. (2021). MENA Report.
Â
Jevsejev. (2020).Â
INFORMATION TECHNOLOGY RISK ASSESSMENT METHODS AND IMPROVEMENT SOLUTIONS
. Science Future of Lithuania, 12, 1–7.
Â
Gomez. (2019).Â
Proactive management of plant cybersecurity: A combination of information technology (IT) and operations technology (OT) cybersecurity expertise is required to manage the infux of Industrial Internet of Things (IIoT) devices and increased IT/OT integration
. Control Engineering, 66(2), 20–.
|
|
Week 7
|
Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020).Â
How integration of cyber security management and incident response enables organizational learning
. Journal of the Association for Information Science and Technology, 71(8), 939-953.
Â
Ahmad, Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021).Â
Network intrusion detection system: A systematic study of machine learning and deep learning approaches
. Transactions on Emerging Telecommunications Technologies, 32(1).
Â
Kennedy, Gonick, S. A., & Errett, N. A. (2021).Â
Are We Ready to Build Back “Healthier?†An Exploratory Analysis of U.S. State-Level Disaster Recovery Plans
. International Journal of Environmental Research and Public Health, 18(15), 8003–.
Â
Back, & Guerette, R. T. (2021).Â
Cyber Place Management and Crime Prevention: The Effectiveness of Cybersecurity Awareness Training Against Phishing Attacks
. Journal of Contemporary Criminal Justice, 37(3), 427–451.
Â
Brown. (2019).Â
Technologies and infrastructure: costs and obstacles in developing large-scale computer-based testing
. Education Inquiry, 10(1), 4–20
|
|
Week 8
|
An Introduction to Cybersecurity Ethics
. Published by theÂ
Markkula Center for Applied Ethics
 at Santa Clara University.
Â
Hee Wan Kim. (2021).Â
A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code
. International Journal of Advanced Culture Technology(IJACT), 9(4), 288–294.
Â
Sungjoong Kim, Seongkyu Yeom, Haengrok Oh, Dongil Shin, & Dongkyoo Shin. (2021).Â
Automatic Malicious Code Classification System through Static Analysis Using Machine Learning
. Symmetry (Basel), 13(35), 35–.
Â
Srivastava, Gupta, S., Quamara, M., Chaudhary, P., & Aski, V. J. (2020).Â
Future IoTâ€enabled threats and vulnerabilities: State of the art, challenges, and future prospects
. International Journal of Communication Systems, 33(12), e4443–n/a.
|
|