Security Threats and Attacks
Official Documentation
- NIST Computer Security Resource Center
- Link
- OWASP (Open Web Application Security Project)
- Link
- US-CERT (United States Computer Emergency Readiness Team)
- Link
- MITRE ATT&CK Framework
- Link
Research Papers
- "A Survey of Coordinated Attacks and Collaborative Intrusion Detection" by F. Gong (2003)
- Link
- "A Survey of Insider Attack Detection Research" by M. Salem et al. (2008)
- Link
- "A Survey of Botnet and Botnet Detection" by M. Feily et al. (2009)
- Link
Additional Online Resources
- Cybersecurity & Infrastructure Security Agency (CISA) Resources
- Link
- SANS Internet Storm Center
- Link
- Krebs on Security
- Link
Books
- "The Art of Attack: Attacker Mindset for Security Professionals" by Maxie Reynolds
- ISBN: 1119805465
- Provides insights into the mindset and strategies of attackers to help defenders improve their security posture.
- "Threat Modeling: Designing for Security" by Adam Shostack
- ISBN: 1118809998
- Offers a comprehensive approach to identifying and mitigating potential security threats in system design.
- "Hacking: The Art of Exploitation" by Jon Erickson
- ISBN: 1593271441
- Explores various hacking techniques and attacks, providing a deep understanding of how they work.
- "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws" by Dafydd Stuttard and Marcus Pinto
- ISBN: 1118026470
- Focuses on web application security, covering a wide range of attacks and defense strategies.
Standards
- ISO/IEC 27001:2013 Information Security Management
- Provides requirements for an information security management system (ISMS)
- NIST Special Publication 800-53 Security and Privacy Controls for Information Systems and Organizations
- Link
Online Courses
- Coursera: Cybersecurity Specialization by University of Maryland
- Link
- edX: Cybersecurity Fundamentals
- Link
- Udacity: Security Analyst Nanodegree
- Link