Difference between revisions of "Cybersecurity Frameworks, Architectures & Roadmaps"

From
Jump to: navigation, search
Line 28: Line 28:
  
 
https://www.nist.gov/sites/default/files/styles/960_x_960_limit/public/images/2018/02/06/uoc_process.png
 
https://www.nist.gov/sites/default/files/styles/960_x_960_limit/public/images/2018/02/06/uoc_process.png
 +
 +
=== Other Cybersecurity ===
 +
* [http://www.cfr.org/report/increasing-international-cooperation-cybersecurity-and-adapting-cyber-norms Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms]
 +
* [http://www.youtube.com/watch?v=GqmQg-cszw4&list=PLUl4u3cNGP62K2DjQLRxDNRi0z2IRWnNh&index=1 Cybersecurity Systems Security | MIT]
 +
* [http://www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack-target.html 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor  | CIO]

Revision as of 09:25, 18 July 2018