Intelligence driven computer network defense informed

This preview shows page 15 out of 15 pages.

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Retrieved from: - martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf National Institute of Standards and Technology (NIST). (2001). Security Requirements for Cryptographic Modules. Retrieved from: - module-validation-program/standards Pinola, M. (2018). Features and Uses of an Ad Hoc Wireless Network. Retrieved from: Ray, B. (2017). What are ZigBee, WiFi, Bluetooth, BLE, and WiMax?Retrieved from: Wireless security protocols: The difference between WEP, WPA, WPA2. Retrieved from: - encryption-basics-Understanding-WEP-WPA-and-WPA2 Souppaya, M. Scarfone, K. (2012). National Institute of Standards and Technology (NIST). Guidelines for Securing Wireless Local Area Networks (WLANs). Special Publication 800-153. Retrieved from:

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture