Endnotes

Chapter 1

   1.  http://www2.trustwave.com/rs/trustwave/images/2014TrustwaveSecurityPressuresReport.pdf

   2.  The origins of the CIA triad are lost to history. Some of the ideas behind the triad were certainly known in ancient times, military leaders of antiquity ensured confidentiality of messages, and verification of who sent the message was equally important. Being able to create authentic-sounding, conflicting orders that could be delivered to one’s enemy would have been a great coup. In more modern usage, the CIA triad forms the basis of many information assurance standards, including those from the ISO. http://www.techrepublic.com/blog/it-security/the-cia-triad/

   3.  https://www.schneier.com/essays/archives/2008/01/the_psychology_of_se.html ...

Get Information Technology Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.