Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- [1] The Most Popular Computer Software, Ranked: https://strawpoll.com/most-popular-computer-software
- [2] Data-hungry apps: These are the worst for your privacy: https://www.komando.com/security-privacy/data-hungry-apps/852537/
- [3] Netflix Chaos Monkey: https://netflix.github.io/chaosmonkey/
- [4] MITRE ATT&CK, cyber kill chain, and purple teams: https://www.sans.org/blog/cyber-kill-chain-mitre-attack-purple-team/
- [5] Google AI Red Teams: https://blog.google/technology/safety-security/googles-ai-red-team-the-ethical-hackers-making-ai-safer/
- [6] OSINT framework: https://osintframework.com/
- [7] Equifax data breach FAQ: https://www.csoonline.com/article/567833/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html