Dr. Greg Bernstein
January 12th, 2022
A cloud of secrecy and shame surrounding cyber-attacks amplifies the difficulties. Firms cover them up. The normal incentives for them and their counterparties to mitigate risks do not work well. Many firms neglect the basics, such as two-step authentication. Colonial had not taken even simple precautions.
The cyber-security industry has plenty of sharks who bamboozle clients. Much of what is sold is little better than “medieval magic amulets”, in the words of one cyber-official.
From Center for Strategic and International Studies: Costs of Cybercrime
The Center for Strategic and International Studies (CSIS), in partnership with McAfee, presents The Hidden Costs of Cybercrime. As the global losses from cybercrime approach $1 trillion, this report focuses on the costs of cybercrime that organizations may be less aware of, such as opportunity costs, downtime and damaged staff morale.
From Center for Strategic and International Studies: Costs of Cybercrime
From Center for Strategic and International Studies: Costs of Cybercrime
From Center for Strategic and International Studies: Costs of Cybercrime
From Center for Strategic and International Studies: Costs of Cybercrime
From Center for Strategic and International Studies: Costs of Cybercrime
We need to be familiar with a reasonable sample of famous and/or recent attacks
Publicly available cybersecurity topic recommendations
From NCyTE Center Knowledge Units
Foundational KU: Basic Cryptography, Cyber Threats, Cybersecurity Foundations, Cybersecurity Principles, Independent/Directed Study/Research, IT Systems Components
Technical Core KU: Basic Cryptography, Basic Networking, Basic Scripting and Programming, Network Defense, Operating Systems Concepts
Non-Technical Core KU: Cyber Threats, Cybersecurity Planning and Management; Policy, Legal, Ethics, and Compliance; Security Program Management, Security Risk Analysis
Advanced Algorithms, Advanced Cryptography, Advanced Network Technology and Protocols, Algorithms, Analog Telecommunications, Basic Cyber Operations, Cloud Computing, Cyber Crime, Cybersecurity Ethics, Data Administration, Data Structures, Database Management Systems, Databases, Device Forensics, Digital Communications, Digital Forensics, Embedded Systems, Forensic Accounting, Formal Methods, Fraud Prevention and Management, Hardware Reverse Engineering, Hardware/Firmware Security, Host Forensics, IA Architectures, IA Compliance, IA Standards, Independent/Directed Study/Research, Industrial Control Systems, Introduction to Theory of Computation, Intrusion Detection/Prevention Systems, Life-Cycle Security, Linux System Administration, Low Level Programming, Media Forensics, Mobile Technologies, Network Forensics, Network Security Administration, Network Technology and Protocols, Operating Systems Administration, Operating Systems Hardening, Operating Systems Theory, Penetration Testing, Privacy, QA/Functional Testing, Radio Frequency Principles, Secure Programming Practices, Software Assurance, Software Reverse Engineering, Software Security Analysis, Supply Chain Security, Systems Certification and Accreditation, Systems Programming, Systems Security Engineering, Virtualization Technologies, Vulnerability Analysis, Web Application Security, Windows System Administration, Wireless Sensor Networks
From NCyTE: Cybersecurity Foundations, combined and ordered by me
From NCyTE: Cybersecurity Foundations, combined and ordered by me
So many to remember and look up
We may write some small programs to illustrate some core concepts
You may use Python
You may use JavaScript via Node.js (or the browser)
No other languages will be accepted
They offer a lot of different certifications and sell training courses.
International Information System Security Certification Consortium
(ISC)^2 – Seems to be a big certification organization in this area. They also sell training.
Some of ISC^2 certifications