Further reading
To learn more about the topics that were covered in this chapter, check out the following links:
- What is the CIA Triad?: https://www.fortinet.com/resources/cyberglossary/cia-triad
- Cyber Security Threats: https://www.imperva.com/learn/application-security/cyber-security-threats/
- Zero Trust Security Explained: Principles of the Zero Trust Model: https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/
- Use these 6 user authentication types to secure networks: https://www.techtarget.com/searchsecurity/tip/Use-these-6-user-authentication-types-to-secure-networks
- What is risk management and why is it important? https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important