Further reading
Following are the references we used in this chapter along with some bonus reading materials for you to check out:
- Lockheed Martin’s overview of the Cyber Kill Chain® framework for identifying and preventing cyber intrusions – https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
- Wikipedia article about the 2015 cyberattack on Ukraine’s power grid – https://en.wikipedia.org/wiki/2015_Ukraine_power_grid_hack
- New York Times article on the 2017 WannaCry ransomware attack that affected the UK’s National Health Service – https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html
- Wikipedia article detailing the 2017 Equifax data breach that exposed personal information of millions – https://en.wikipedia.org/wiki/2017_Equifax_data_breach
- Wired article about Operation Aurora, a series of cyberattacks against major companies in 2009 – https://www.wired.com/2010/01/operation-aurora/
- SANS Institute’s 2024 CISO Primer on cybersecurity trends and best practices – https://www.sans.org/mlp/ciso-primer-2024/
- IBM’s Cost of a Data Breach Report 2024 analyzing the financial impact of data breaches – https://www.ibm.com/downloads/cas/1KZ3XE9D
- Research paper on the evolution of Security Operations Centers from reactive to proactive strategies – https://vipublisher.com/index.php/vij/article/view/589
- Study on leveraging artificial intelligence to enhance security operations while balancing efficiency and human oversight – https://vipublisher.com/index.php/vij/article/view/588