Thursday, April 16, 2015

Cybersecurity Internet Resources Take 2 (Week 6)

In my previous post titled “Cybersecurity Internet Resources”, I identified credible web sources of information for threats, vulnerabilities, updates, and security news in general.  In this week’s post I am going to reevaluate the list of provided web sources to determine if I use those web sources regularly to assist me with my assignments or if there are any other sources I can add to the list.

Below is a list of the web sources provided in my previous post:
  • National Vulnerability Database
  • Common Vulnerabilities and Exposures – Official Site
  • CVE Details
  • Internet Storm Center
  • The Honeynet Project
  • McAfee’s Threat Center
  • Symantec Security Response
  • Information Week’s Dark Reading
  • Schneier on Security
  • Bellevue University’s Cybersecurity Center
What I have found is I like every site and visit each often; however, I do visit some more than others and use five of them extensively to assist me with my cybersecurity studies.  The five sites I find myself visiting and using more than the others are:
  • National Vulnerability Database
  • Common Vulnerabilities and Exposures – Official Site
  • CVE Details
  • Information Week’s Dark Reading
  • McAfee’s Threat Center
The first three web sources are great for researching and discovering system vulnerabilities.  The last two sources are good for staying current and learning about discovered vulnerabilities, but they are also good sources to use for learning about current and emerging threats.

It is difficult to determine if one or more of the initial web sources should be removed from the list because of not using it extensively for my research purposes.  All of them have been used at some point over the past three years to assist me with obtaining more information about a cybersecurity related topic.  Therefore, I have elected to keep the list as is.  The list can be used as a tool for others to use as a guide to build their own web source library.  Feel free to pick and choose the ones that will work best for you.

There is one web resource I feel should be added to my initial list.  It is a source I can always turn to when I have exhausted my list of sources when trying to obtain information about a topic related to cybersecurity.  That one source I can always count on is Google.
Google always produces other sources that may have something or may lead you to another source containing the information you’re looking for.  Just be sure to verify the discovered information before using it to assist you with whatever you are doing.

No comments:

Post a Comment