References for this module

  • OWASP (Open Web Application Security Project). Available: https://owasp.org/www-project-top-ten/
  • John Wagnon (2017) Lightboard Lessons: OWASP Top 10 - Broken Authentication. Available: https://devcentral.f5.com/s/articles/lightboard-lessons-owasp-top-10-broken-authentication-29192
  • OWASP (Open Web Application Security Project). Available: https://owasp.org/www-project-top-ten/
  • Abi Tyas Tunggal.(2021) What Is Cyber Security? A Thorough Definition. Available from: https://www.upguard.com/blog/cyber-securit [Accessed 14 May 2021].
  • (2019) Insider Threat Report. Available: https://www.cybersecurity-insiders.com/portfolio/insider-threat-report/[Accessed 14 May 2021].
  • Junestam, A., and Guigo, N. (2014) Open Crypto Audit Project TrueCrypt. Available at: https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf [Accessed 10 July 2021].
  • Unknown (2009). Pushing the Limits of Windows: Paged and Nonpaged Pool. [online] docs.microsoft.com. Available at: https://docs.microsoft.com/en-us/archive/blogs/markrussinovich/pushing-the-limits-of-windows-paged-and-nonpaged-pool [Accessed 10 Jul. 2021].
  • Techterms.com. (2017). Page Fault Definition. [online] Available at: https://techterms.com/definition/page_fault. [Accessed 10 Jul. 2021]
  • Al-Debagy, O., Martinek, P. (2018). A Comparative Review of Microservices and Monolithic Architectures. Available from: https://arxiv.org/ftp/arxiv/papers/1905/1905.07997.pdf [Accessed 06 June 2021]
  • Bambang Sugiantoro, S. (2019). Analysis of Password and Salt Combination Scheme To Improve Hash Algorithm Security: https://thesai.org/Publications/ViewPaper?Volume=10&Issue=11&Code=IJACSA&SerialNo=58 [Accessed 06 June 2021]
  • Gholami, A., Laure, E. (2016). SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT DEVELOPMENTS. Available from: https://arxiv.org/ftp/arxiv/papers/1601/1601.01498.pdf [Accessed 06 June 2021]
  • IBM Cloud Education. (2020). Three-Tier Architecture. Available from: https://www.ibm.com/uk-en/cloud/learn/three-tier-architecture [Accessed 07 June 2021]
  • Hoofnagle, C. J., Sloot, B. van der and Borgesius, F. Z. (2019) ‘The European Union general data protection regulation: What it is and what it means’, Information and Communications Technology Law, 28(1), pp. 65–98. DOI: https://doi.org/10.1080/13600834.2019.1573501 [Accessed 07 June 2021]
  • Jaafar, M. et al. (2015) Evaluating the impact of design pattern and anti-pattern dependencies on changes and fault. Available from: https://www.researchgate.net/publication/273898577_Evaluating_the_impact_of_design_pattern_and_anti-pattern_dependencies_on_changes_and_faults [Accessed 07 June 2021]
  • Kirrage, J. et al. (2013) Static Analysis for Regular Expression Denial-of-Service Attacks. Available from: https://www.cs.bham.ac.uk/~hxt/research/reg-exp-sec.pdf [Accessed 07 June 2021]
  • Knott, N. (2018) ‘The General Data Protection Regulation’, Faculty Dental Journal, 9(2), pp. 54–57. DOI: https://doi.org/10.1308/rcsfdj.2018.54 [Accessed 06 June 2021]
  • Krishna Madasu, V., Eltaeib, T. (2015). Web authentication and authorization and Role of HTTP, HTTPS Protocol in Networking. Available from: https://www.researchgate.net/publication/274074810_Web_authentication_and_authorization_and_Role_of_HTTP_HTTPS_Protocol_in_Networking [Accessed 06 June 2021]
  • Lambrinoudakis, C. (2018) The general data protection regulation (GDPR) Era: Ten steps for compliance of data processors and data controllers, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer International Publishing. DOI: https://doi.org/10.1007/978-3-319-98385-1_1 [Accessed 07 June 2021]
  • Lou, C. et al. (2019). Comprehensive and Efficient Runtime Checking in System Software through Watchdogs. Available from: https://www.cs.jhu.edu/~chlou/paper/watchdog-hotos19-preprint.pdf [Accessed 06 June 2021]
  • Martin, Y. S. and Kung, A. (2018) Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018, pp. 108–111. DOI: https://doi.org/10.1109/EuroSPW.2018.00021 [Accessed 07 June 2021]
  • Murphy, J. F. A. (2018) The General Data Protection Regulation (GDPR), Irish Medical Journal, 111(5), p. 747. DOI: https://doi.org/10.1007/978-3-319-57959-7 [Accessed 07 June 2021]
  • NASA. (2010). Reference guide to the international space station. Available from: https://www.nasa.gov/pdf/508318main_ISS_ref_guide_nov2010.pdf [Accessed 06 June 2021]
  • NASA. (2007). Final report of the international space station independent safety task force. Available from: https://www.nasa.gov/pdf/170368main_IIST_%20Final%20Report.pdf [Accessed 06 June 2021]
  • OWASP. (2017) OWASP Top Ten. Available from: https://owasp.org/www-project-top-ten/ [Accessed 07 June 2021]
  • Prakash, A. (2019). Detection and Mitigation of Denial of Service Attacks Using Stratified Architecture: https://www.sciencedirect.com/science/article/pii/S1877050916305014 [Accessed 06 June 2021]