References
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- Cybersecurity and Infrastructure Security Agency. (n.d.). Defending Against Software Supply Chain Attacks: https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508_1.pdf
- National Cyber Security Centre. (n.d.). Understanding Vulnerabilities: https://www.ncsc.gov.uk/collection/vulnerability-management/understanding-vulnerabilities#:~:text=A%20vulnerability%20is%20a%20weakness,to%20achieve%20their%20end%20goal
- Department of Homeland Security. (2022). Ransomware Attacks: https://www.dhs.gov/sites/default/files/2022-09/Ransomware%20Attacks%20.pdf
- Cybersecurity & Infrastructure Security Agency. (2023). Cybersecurity Advisories [AA23-215A]: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
- Cybersecurity & Infrastructure Security Agency. (2022). Cybersecurity Advisories [AA22-117A...