Reference Link Library
The reference link library provided below is intended to serve as a helpful store of information pointing to the most common cybersecurity industry resources, sites, and documentation. The resources referenced below have proven valuable throughout the USD Cybersecurity Operations and Leadership Program.
CSOL Course-Specific References
Cybersecurity Fundamentals
ACM Special Interest Group on Security, Audit and Control (SIGSAC)
CIS Critical Security Controls (CIS 18)
Data Center Knowledge
SC Magazine
McAfee Resource Library
Cryptography
CipherTools
GnuPG
Internet Society
Microsoft Security
OpenPGP
OpenSSL
Schneier on Security
Security Architecture
Enterprise Security Architecture - A Business-Driven Approach
SABSA Enterprise Security Architecture
TOGAF Standard - The Open Group
Open Security Architecture (OSA)
Operational Policy
Educause
HIPAA Journal
The Brookings Institution: TechStream
Risk Management
BeyondCorp
Compliance Forge
Federal News Network
James Hamilton: Perspectives
Management and Cybersecurity
Australian Cyber Security Centre (ACSC) Information Security Manual (ISM)
Cybray
Financial Services Sector Coordinating Council
Palo Alto Network Cyberpedia
Secure Software Design and Development
Adobe Common Controls Framework (CCF)
Atlassian Secure Software Development
GitHub Secure Software Development Strategy Essentials
Ockam.io
Open Web Application Security Project (OWASP)
Network Visualization and Vulnerability Detection
Cloudflare Blog
Dragos ICS Security
Google BeyondCorp
Kismet Wireless
Institute of Electrical and Electronics Engineers
Internet Engineering Task Force
OWASP WebGoat
Cyber Threat Intelligence
Crowdstrike
Common Vulnerabilities and Exposures (CVE) Program
RecordedFuture
Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)
Zscaler
Incident Response and Computer Network Forensics
CyberChef
OpenText EnCase
Scientific Working Group on Digital Evidence (SWGDE)
The Sleuth Kit - Autopsy
ACM Special Interest Group on Security, Audit and Control (SIGSAC)
CIS Critical Security Controls (CIS 18)
Data Center Knowledge
SC Magazine
McAfee Resource Library
Cryptography
CipherTools
GnuPG
Internet Society
Microsoft Security
OpenPGP
OpenSSL
Schneier on Security
Security Architecture
Enterprise Security Architecture - A Business-Driven Approach
SABSA Enterprise Security Architecture
TOGAF Standard - The Open Group
Open Security Architecture (OSA)
Operational Policy
Educause
HIPAA Journal
The Brookings Institution: TechStream
Risk Management
BeyondCorp
Compliance Forge
Federal News Network
James Hamilton: Perspectives
Management and Cybersecurity
Australian Cyber Security Centre (ACSC) Information Security Manual (ISM)
Cybray
Financial Services Sector Coordinating Council
Palo Alto Network Cyberpedia
Secure Software Design and Development
Adobe Common Controls Framework (CCF)
Atlassian Secure Software Development
GitHub Secure Software Development Strategy Essentials
Ockam.io
Open Web Application Security Project (OWASP)
Network Visualization and Vulnerability Detection
Cloudflare Blog
Dragos ICS Security
Google BeyondCorp
Kismet Wireless
Institute of Electrical and Electronics Engineers
Internet Engineering Task Force
OWASP WebGoat
Cyber Threat Intelligence
Crowdstrike
Common Vulnerabilities and Exposures (CVE) Program
RecordedFuture
Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)
Zscaler
Incident Response and Computer Network Forensics
CyberChef
OpenText EnCase
Scientific Working Group on Digital Evidence (SWGDE)
The Sleuth Kit - Autopsy
Major Industry Websites
Cloud Security Alliance (CSA)
Information Systems Audit and Control Association (ISACA)
SANS Institute
Information Systems Audit and Control Association (ISACA)
SANS Institute
Government Resources
Domestic (U.S)
Department of Justice (DOJ) Cybersecurity Unit
Director of National Intelligence
National Institute of Standards and Technology (NIST)
U.S. Computer Emergency Readiness Team
International
Australian Signals Directorate
U.K. National Cyber Security Centre
Department of Justice (DOJ) Cybersecurity Unit
Director of National Intelligence
National Institute of Standards and Technology (NIST)
U.S. Computer Emergency Readiness Team
International
Australian Signals Directorate
U.K. National Cyber Security Centre
Cybersecurity News
CIO Magazine
CNET
Computerworld
CSO Online
Cyber Insights Magazine
Cybermagazine
Cybersecurity Insiders
Cyberseek US
Daniel Miessler
DarkReading
Graham Cluley
International Association of Privacy Professionals (IAPP)
IT Security Guru
Krebs on Security
PCWorld
Schneier on Security
Security Weekly
Signal Magazine
TaoSecurity
The Hacker News
The Last Watchdog
Threatpost
Troy Hunt
USD Master of Science in Cybersecurity Blog
Wired Security
CNET
Computerworld
CSO Online
Cyber Insights Magazine
Cybermagazine
Cybersecurity Insiders
Cyberseek US
Daniel Miessler
DarkReading
Graham Cluley
International Association of Privacy Professionals (IAPP)
IT Security Guru
Krebs on Security
PCWorld
Schneier on Security
Security Weekly
Signal Magazine
TaoSecurity
The Hacker News
The Last Watchdog
Threatpost
Troy Hunt
USD Master of Science in Cybersecurity Blog
Wired Security
Cybersecurity Vendors & Tools
Certification and Training
Books
Go-To Reading List
OSU Cybersecurity Canon
Course Texts
Bosworth, S., Kabay, M. E., & Whyne, E. (2014). Computer Security Handbook (6th ed., Vol. 1). Wiley.
Du, W. (2019). Computer Security: A Hands-on Approach (2nd ed.). Wenliang Du.
Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering. Wiley.
Jensen, C. J., III, McElreath, D. H., & Graves, M. (2017). Introduction to Intelligence Studies (2nd ed.). Routledge.
Sherwood, J., Clark, A., & Lynas, D. (2019). Enterprise Security Architecture: A Business- Driven Approach. Routledge.
OSU Cybersecurity Canon
Course Texts
Bosworth, S., Kabay, M. E., & Whyne, E. (2014). Computer Security Handbook (6th ed., Vol. 1). Wiley.
Du, W. (2019). Computer Security: A Hands-on Approach (2nd ed.). Wenliang Du.
Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering. Wiley.
Jensen, C. J., III, McElreath, D. H., & Graves, M. (2017). Introduction to Intelligence Studies (2nd ed.). Routledge.
Sherwood, J., Clark, A., & Lynas, D. (2019). Enterprise Security Architecture: A Business- Driven Approach. Routledge.
Selected NIST Publications
SP 800-12 Rev. 1: An Introduction to Information Security
SP 800-18 Rev. 1: Guide for Developing Security Plans for Federal Information Systems
SP 800-30 Rev. 1: Guide for Conducting Risk Assessments
SP 800-34 Rev. 1: Contingency Planning Guide for Federal Information Systems
SP 800-37 Rev. 2: Risk Management Framework for Information Systems and Organizations
SP 800-39: Managing Information Security Risk: Organization, Mission, and Information System View
SP 800-47 Rev. 1: Managing the Security of Information Exchanges
SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations
SP 800-101 Rev. 1: Guidelines on Mobile Device Forensics
SP 800-137: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
SP 800-171 Rev. 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
SP 800-175B Rev. 1: Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
FIPS 140-2: Security Requirements for Cryptographic Modules
FIPS 199: Standards for Security Categorization of Federal Information and Information Systems
FIPS 200: Minimum Security Requirements for Federal Information and Information Systems
SP 800-18 Rev. 1: Guide for Developing Security Plans for Federal Information Systems
SP 800-30 Rev. 1: Guide for Conducting Risk Assessments
SP 800-34 Rev. 1: Contingency Planning Guide for Federal Information Systems
SP 800-37 Rev. 2: Risk Management Framework for Information Systems and Organizations
SP 800-39: Managing Information Security Risk: Organization, Mission, and Information System View
SP 800-47 Rev. 1: Managing the Security of Information Exchanges
SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations
SP 800-101 Rev. 1: Guidelines on Mobile Device Forensics
SP 800-137: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
SP 800-171 Rev. 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
SP 800-175B Rev. 1: Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
FIPS 140-2: Security Requirements for Cryptographic Modules
FIPS 199: Standards for Security Categorization of Federal Information and Information Systems
FIPS 200: Minimum Security Requirements for Federal Information and Information Systems
References
The links listed on this page were compiled from citations used throughout the USD CSOL program and from the references listed below:
Moore, M., PhD. (n.d.). The Top Cyber Security Blogs and Websites of 2022. University of San Diego. https://onlinedegrees.sandiego.edu/top-cyber-security-blogs-websites/
Moore, M., PhD. (n.d.). The Top Cyber Security Blogs and Websites of 2022. University of San Diego. https://onlinedegrees.sandiego.edu/top-cyber-security-blogs-websites/