CSOL 510- Applied Cryptography was a challenging class for me. I put a lot of effort into this course because this class had a hands-on approach in respect of all the cryptographic assignments related to OpenSSL and SeedLabs.
Valuable Resources
Barker, E. B. (2016, August). Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms. https://doi.org/10.6028/nist.sp.800-175b
Barker, E., & Dang, Q. (2015). NIST Special Publication 800-57 Part 3 Revision.
Barker, E., & Roginsky, A. (2015, November). NIST Laboratory Information Systems Team - Problem processing request. Nist.Gov. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf
Bosworth., S., Kabay, M., & Whyne, E. (2014). Computer Security Handbook, Sixth Edition, Volume 2 (6th ed.). Wiley.
Cisco FIPS-Compliant VPN Clients. (2009, August 17). Cisco. https://www.cisco.com/en/US/docs/security/vpn_client/fips/general/intro_FIPS_clients.ht ml
Greig, J. (2022, January 18). Ransomware: 2,300+ local governments, schools, healthcare providers impacted in 2021. ZDNet. https://www.zdnet.com/article/2300-local-governments-schools-healthcare-providers-imp acted-by-ransomware-in-2021/
HIPAA Journal. (2020, December 28). What is Considered PHI Under HIPAA? Hipaajournal.com. https://www.hipaajournal.com/considered-phi-hipaa/
Microsoft. (2021, December 3). Federal Information Processing Standard (FIPS) 140 Validation - Windows security. Microsoft Docs. https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation# :%7E:text=Windows%2010%20and%20Windows%20Server,the%20Cryptographic%20P rimitives%20Library%20(bcryptprimitives.
NIST. (n.d.). Glossary. https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/glossary Truss, C. (2021, December 16). Taking Steps to Prevent the Rise of Ransomware Attacks in Healthcare. HIMSS. https://www.himss.org/resources/taking-steps-prevent-rise-ransomware-attacks-healthcar e
Valuable Resources
Barker, E. B. (2016, August). Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms. https://doi.org/10.6028/nist.sp.800-175b
Barker, E., & Dang, Q. (2015). NIST Special Publication 800-57 Part 3 Revision.
Barker, E., & Roginsky, A. (2015, November). NIST Laboratory Information Systems Team - Problem processing request. Nist.Gov. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf
Bosworth., S., Kabay, M., & Whyne, E. (2014). Computer Security Handbook, Sixth Edition, Volume 2 (6th ed.). Wiley.
Cisco FIPS-Compliant VPN Clients. (2009, August 17). Cisco. https://www.cisco.com/en/US/docs/security/vpn_client/fips/general/intro_FIPS_clients.ht ml
Greig, J. (2022, January 18). Ransomware: 2,300+ local governments, schools, healthcare providers impacted in 2021. ZDNet. https://www.zdnet.com/article/2300-local-governments-schools-healthcare-providers-imp acted-by-ransomware-in-2021/
HIPAA Journal. (2020, December 28). What is Considered PHI Under HIPAA? Hipaajournal.com. https://www.hipaajournal.com/considered-phi-hipaa/
Microsoft. (2021, December 3). Federal Information Processing Standard (FIPS) 140 Validation - Windows security. Microsoft Docs. https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation# :%7E:text=Windows%2010%20and%20Windows%20Server,the%20Cryptographic%20P rimitives%20Library%20(bcryptprimitives.
NIST. (n.d.). Glossary. https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/glossary Truss, C. (2021, December 16). Taking Steps to Prevent the Rise of Ransomware Attacks in Healthcare. HIMSS. https://www.himss.org/resources/taking-steps-prevent-rise-ransomware-attacks-healthcar e