Desktop version

Home arrow Computer Science arrow Securing Systems Applied Security Architecture and Threat Models

References

  • 1. Jones, J. A. (2005). “An Introduction to Factor Analysis of Information Risk (FAIR).” Risk Management Insight LLC. Retrieved from http://riskmanagementinsight.com/ media/documents/FAIR_Introduction.pdf.
  • 2. Ibid.
  • 3. Schoenfield, B. (2012). “Just Good Enough Risk Rating.” Smart Guide. SANS Institute.
  • 4. Harkins, M. (2013). Managing Risk and Information Security: Protect to Enable, p. xv. Apress Media, LLC.
  • 5. Hopkin, P. (2012). Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management, 2nd ed., p. 14. Institute of Risk Management (IRM). Kogan Page.
  • 6. Jones, J. A. (2005). “An Introduction to Factor Analysis of Information Risk (FAIR).” Risk Management Insight LLC. Retrieved from http://riskmanagementinsight.com/ media/documents/FAIR_Introduction.pdf.
  • 7. Ibid.
  • 8. U.S. Senate Committee on Commerce, Science, and Transportation. (March 26, 2014). A “Kill Chain” Analysis of the 2013 Target Data Breach. Majority Staff Report For Chairman Rockefeller.
  • 9. Harris, K. D. (February 2014). “Cybersecurity in the Golden State.” California Department of Justice.
  • 10. Welch, C. (February 14, 2014). “Target’s Cybersecurity Team Raised Concerns Months Before Hack.” he Verge. Retrieved from http://www.theverge.com/2014/2/14/5412084/ target-cybersecurity-team-raised-concerns-before-hack.
  • 11. Mansourov, N. and Campara, D. (2011). System Assurance: Beyond DetectingVulnerabilities. p. xv. Morgan Kaufmann Publishers.
  • 12. Hansen, R. (2013). “XSS Filter Evasion Cheat Sheet.” OWASP.org. Retrieved from https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet.
  • 13. Anley, C., Heasman, J., Lindner, F., and Richarte, G. (2007). he Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd ed. John Wiley & Sons.
  • 14. Schoenfield, B. (2014). “Applying the SDL Framework to the Real World” (Ch. 9). In Core Software Security: Security at the Source, pp. 255—324. Boca Raton (FL): CRC Press.
  • 15. ISO Technical Management Board Working Group on risk management, ISO 31000:2009, Risk management — Principles and guidelines, 2009-11-15, ICS, 03.100.01. Available from: https://www.iso.org/obp/ui/#iso:std:iso:31000:ed-1:v1:en.
 
Source
< Prev   CONTENTS   Source   Next >