Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Cybersecurity: Home

Getting Started with Cybersecurity

Check Out a Book to Learn About Cybersecurity
Link to Cyber security by Duane Wilson in the Catalog
Link to Cybersecurity Foundations course in the catalog
Link to Cybersecurity for Dummies by Joseph Steinberg in the Catalog
Link to 8 steps to better security by Kim Crawley in the Catalog
Link to Microsoft Azure Network Security by Nicolas DiCola in the Catalog
Link to Cyber Crisis by Eric Cole in the Catalog
Link to Great Courses' Thinking About Cybersecurity in the catalog
Link to Big Breaches by Neil Daswani in the Catalog
Link to No Safe Harbor by Mark Sangster in the Catalog
Link to Cybersecurity Essentials by Charles Brooks in the Catalog
Link to Tribe of Hackers Blue Team by Marcus Carey in the Catalog
Link to Secret to cybersecurity by Scott Augenbaum in the Catalog
Link to How Cybersecurity really works by Sam Grubb in the Catalog
Link to Messing with the enemy by Clint Watts in the Catalog
Link to The Executive's Cybersecurity Advisor by Michael Gable in the Catalog
Link to Cyber Security Mindset by Dewayne Hart in the Catalog
Cybersecurity

Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.  Cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A significant portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cyber security describes the discipline dedicated to protecting that information and the systems used to process or store it.  Continue reading from DataInsider

Cybersecurity Applications

Cybersecurity and privacy are important to the nation and its citizens. The Cybersecurity and Privacy Applicants Group addresses critical needs for new and existing technology. The National Institute of Standards and Technology (NIST) develops, integrates and promotes standards and guidelines to meet established standards for cybersecurity privacy needs.  Our Cybersecurity Framework consists of standards, guidelines and best practices to manage cybersecurity risks. The Framework is a flexible, cost-effective, voluntary program that promotes the protection and resilience of the nation’s critical infrastructure.   We collaborate with the Small Business Administration and the Federal Bureau of Investigation to provide training for small and medium-sized businesses. Businesses of this size rely on information technology (IT) for storing, process and transmitting critical information needed for day-to-day operations. Unlike large corporations, small and medium-sized businesses cannot justify a full-time IT staff. Continue reading from National Institute of Standards and Technology