Future reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- [1] Attacker dwell time: https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/attacker-dwell-time.html
- [2] Colonial Pipeline attack: https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years
- [3] Deepfake attack story on WSJ: https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402
- [4] LLM Agents can Autonomously Hack Websites: https://arxiv.org/abs/2402.06664v1
- [5] RACI matrix for ISO 27001: https://advisera.com/27001academy/blog/2018/11/05/raci-matrix-for-iso-27001-implementation-project/
- [6] A Brief History of Cryptography: https://www.redhat.com/en/blog/brief-history-cryptography
- [7] The Enigma machine: https://en.wikipedia.org/wiki/Enigma_machine
- [8] Shor’s algorithm explained: https...