Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

References

Beaming (2020) Cyber Threat Report Q1 2020 [Online]. Available at https://www.beaming.co.uk/ cyber-reports/ cyber-threat-report-q1-2020 [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] (Accessed 15 June 2020).
BIS (2014) BIS Cyber Security Breaches Survey [Online]. Available at http://www.pwc.co.uk/ audit-assurance/ publications/ 2014-information-security-breaches-survey.jhtml (Accessed 12 October 2020).
CERT Insider Threat Center (2010) Interesting Insider Threat Statistics [Online]. Available at https://insights.sei.cmu.edu/ insider-threat/ 2010/ 10/ interesting-insider-threat-statistics.html (Accessed 12 October 2020).
CISA (2020) Alert (AA20-099A) COVID-19 Exploited by Malicious Cyber Actors [Online]. Available at https://www.us-cert.gov/ ncas/ alerts/ aa20-099a (Accessed 23 June 2020).
DCMS (2020) Cyber Security Breaches Survey 2020 [Online]. Available at https://www.gov.uk/ government/ publications/ cyber-security-breaches-survey-2020/ cyber-security-breaches-survey-2020 (Accessed 15 June 2020).
Department for Digital, Culture, Media and Sport (2019) Cyber Security Breaches Survey 2019. Available at https://assets.publishing.service.gov.uk/ government/ uploads/ system/ uploads/ attachment_data/ file/ 813599/ Cyber_Security_Breaches_Survey_2019_-_Main_Report.pdf (Accessed: 4 December 2019).
Dragos (2019) Threat Proliferation in ICS Cybersecurity: XENOTIME now targeting electric sector, in addition to oil and gas. Available at: https://dragos.com/ blog/ industry-news/ threat-proliferation-in-ics-cybersecurity-xenotime-now-targeting-electric-sector-in-addition-to-oil-and-gas/ (Accessed: 4 December 2019).
Sophos (2019) SophosLabs 2019 Threat Report. Available at: https://www.sophos.com/ en-us/ medialibrary/ PDFs/ technical-papers/ sophoslabs-2019-threat-report.pdf?la=en (Accessed: 4 December 2019).
Statista (2018) Annual number of data breaches and exposed records in the United States from 2005 to 2018. Available at: https://www.statista.com/ statistics/ 273550/ data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/ (Accessed: 4 December 2019)
TechCrunch (2019a) Millions of Instagram influencers had their contact data scraped and exposed. Available at: https://techcrunch.com/ 2019/ 05/ 20/ instagram-influencer-celebrity-accounts-scraped/ (Accessed: 4 December 2019).
TechCrunch (2019b) A huge database of Facebook users’ phone numbers found online. Available at: https://techcrunch.com/ 2019/ 09/ 04/ facebook-phone-numbers-exposed/ (Accessed: 4 December 2019).
TrendMicro (2019) 2019 Midyear security roundup: Evasive threats, pervasive effects. Available at: https://www.trendmicro.com/ vinfo/ us/ security/ research-and-analysis/ threat-reports/ roundup/ evasive-threats-pervasive-effects (Accessed: 4 December 2019).
ZDNet (2019) Database leaks data on most of Ecuador’s citizens, including 6.7 million children. Available at: https://www.zdnet.com/ article/ database-leaks-data-on-most-of-ecuadors-citizens-including-6-7-million-children/ (Accessed: 4 December 2019).