Skip to main content

Mobile Main Menu

  • Library Portal
    • Library Resources
      • Search the Library
      • A-Z Databases
      • Browse Journals
    • Accessibility Tools
    • Subject Guides
      • Business Management
      • Computing
      • Criminal Justice
      • Design and creativity
      • Digital Education in Practice
      • Finance and Accounting
      • Health and Care Management
      • Human Resource Management
      • Hospitality and Tourism
      • Investigation, Security and Defence
      • Law
      • Marketing
      • Psychology
      • Supply Chain Management and Logistics
      • Foundation Year
  • English Language Hub
    • Academic Writing in English
    • Self-study Resources
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home
  • Library Portal
    • Library Resources
    • Accessibility Tools
    • Research Tools
    • Subject Guides
    • AppsAnywhere
    • Search the Library
    • A-Z Databases
    • Browse Journals
    • eBook Spotlight Collections

    Get started with the Library Portal

    Get Started
    • Accessible eBooks
    • Document Conversion Tools
    • RNIB Bookshare
    • Sensus Access

    Get started with the Library Portal

    Get Started
    • Research Tools

    Get started with the Library Portal

    Get Started
    Faculty of Social Sciences
    • Criminal Justice
    • Digital Education in Practice
    • Investigation, Security and Defence
    • Law
    • Psychology
    STEM
    • Computing
    Arden Business
    • Business Management
    • Design and Creativity
    • Finance
    • Marketing
    • Health and Care Management
    • Human Resource Management
    • Supply Chain and Project Management
    • Hospitality and Tourism
    • MBA and Executive Education
    IFS
    • Foundation Year
     

    Get started with the Library Portal

    Get Started

  • English Language
    • Academic Writing
    • Self-Study Resources
    • Workshops and one-to-ones
    • Academic Writing in English

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • Academic Grammar in Focus
    • Academic Vocabulary in Focus

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • English Language Hub One-to-one
    • English Language Hub Workshops

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
    • Academic Integrity
    • Artificial Intelligence
    • Referencing Guides

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Academic Writing
    • Reading and Notetaking
    • Paraphrasing and Synthesising
    • Critical Thinking
    • Developing Your Academic Voice

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
     

    Book a one-to-one appointment

    Book a appointment

    • JISC Digital Capabilities Discovery Tool
    • Microsoft Office 365

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • What is a Dissertation?
    • Identifying a Research Topic
    • Formatting your Dissertation

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Assessment Types
    • Understanding Assignments
    • Assessment Strategies

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Maths and Statistics
    • Programming
    • SPSS

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops
     

    Book onto a Learning Success Hub workshop

    Book a place
    • Academic Skills Workshops
    • Academic English Workshops
    • Library Workshops

    Book onto a Learning Success Hub workshop

    Book a place

Help

COM6009

Information Security Management

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Essential Resource Website

Cybersecurity Certification | CISSP - Certified…

by (ISC)²
Essential Resource Website

CASP+ (Plus) CompTIA Advanced Security…

by CompTIA
Essential Resource Website

CISA Certification | Certified Information…

by ISACA
Essential Resource Website

CISM Certification | Certified Information…

by ISACA
Essential Resource Website

NVD Dashboard

by National Institute of Standards and Technology
Essential Resource Website

Arden Futures

by Arden Univeristy
Wider Reading Website

Gartner Identifies Three Factors Influencing…

by Gartner
Wider Reading Website

Arden University Careers

by Arden University
Wider Reading Website

CSA Security Guidance for Cloud Computing | CSA

by Cloud Security Alliance
Wider Reading Website

NVD - CVSS v3 Calculator

by National Institute of Standards and Technology

Lesson 2

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Article

Threat Actor Type Inference and Characterization…

by Mavroeidis, V., Hohimer, R., Casey, T. and Jesang, A.
Essential Resource Website

NIST Risk Management Framework | CSRC

by National Institute of Standards and Technology
Essential Resource Website

SP 800-30 Rev. 1, Guide for Conducting Risk…

by National Institute of Standards and Technology
Wider Reading Website

Gartner Forecasts Worldwide Security and Risk…

by Gartner
Wider Reading Website

SP 800-39, Managing Information Security Risk:…

by National Institute of Standards and Technology
Wider Reading Other

Risk Management Framework for Information Systems…

by Ross, R. S.
Wider Reading Other

ISO/IEC 27000 Standards. Available from:

by ISO/IEC

Lesson 3

Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Essential Resource Article

Ethical Obligations to Protect Client Data when…

by Linna, D. W., Jr. and Muchman, W. J.
Essential Resource Other

How the Information Governance Reference Model (…

by EDRM
Wider Reading Other

Data Ethics Framework

by Data Ethics Framework
Wider Reading Other

ISO/IEC 38500:2015

by ISO/IEC 38500:2015
Wider Reading Other

Technical Open Group Architecture Framework

by Technical Open Group Architecture Framework
Wider Reading Other

Control Objectives for Information and Related…

by ISACA.org
Wider Reading Other

Information Technology Infrastructure Library

by Information Technology Infrastructure Library
Wider Reading Other

ISO/IEC 27000 Standards

by ISO/IEC 27000 Standards
Wider Reading Other

General Data Protection Regulation

by General Data Protection Regulation
Wider Reading Other

Data Protection Act 2018

by Data Protection Act 2018
Wider Reading Website

Code of Ethics | Complaint Procedures

by (ISC)²
Wider Reading Website

Ethics for Data Projects

by Kengadaran, S.

Lesson 4

Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Essential Resource Website

Cybersecurity Framework | NIST

by National Institute of Standards and Technology
Essential Resource Website

Privacy Framework | NIST

by National Institute of Standards and Technology
Essential Resource Website

Guide to accountability and governance | ICO

by Information Commissioner’s Office
Wider Reading Website

Translation: Chinese Authorities Announce $1.2B…

by Webster, G.
Wider Reading Other

ISO/IEC 27001:2022.

Wider Reading Other

Payment Card Industry Data Security Standards.

by Payment Card Industry Data Security Standards
Wider Reading Website

Informative References: What are they, and how…

by National Institute of Standards and Technology
Wider Reading Other

NIST SP 800-53

by NIST SP 800-53
Wider Reading Other

Sarbanes-Oxley Act of 2002.

by Congress.Gov
Wider Reading Other

Data Protection Act 2018.

by Gov.UK
Wider Reading Other

Computer Misuse Act 1990

by Gov.uk
Wider Reading Other

Communications Act 2003

by Communications Act 2003
Wider Reading Other

Personal Information Protection and Electronic…

by Government of Canada
Wider Reading Other

Federal Information Security Management Act of…

by Federal Information Security Management Act of 2002
Wider Reading Other

The Privacy and Electronic Communications (EC…

by Gov.UK
Wider Reading eBook

The Security Risk Assessment Handbook: A Complete…

by Landoll, D. J.
Wider Reading Other

Fraud Act 2006.

by Gov.uk
Wider Reading Other

Copyright, Designs and Patents Act 1988

by Gov.uk
Wider Reading Other

General Data Protection Regulation

by General Data Protection Regulation
Wider Reading Other

The Network and Information Systems Regulations…

Wider Reading Other

Federal Information Processing Standards

by Computer Security Resource Center
Wider Reading Other

NIST Cybersecurity Framework

by NIST
Wider Reading Other

Health Insurance Portability and Accountability…

by Health Insurance Portability and Accountability Act of 1996

Lesson 5

Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Essential Resource Website

Examples of Framework Profiles | NIST

by National Institute of Standards and Technology
Essential Resource Website

Framework Documents | NIST

by National Institute of Standards and Technology
Essential Resource Article

BBAC: Behavior-based access control to detect…

by Rikhtechi, L., Rafeh, V. and Rezakhani, A.
Wider Reading Website

7 Types of Identity-Based Attacks – CrowdStrike

by CrowdStrike

Lesson 6

Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Essential Resource Website

Image Steganography

by Stanley, J.
Essential Resource Website

Secure website certificate | Firefox Help

by Mozilla
Essential Resource Website

Asset management: Implementing asset management…

by National Cyber Security Centre
Essential Resource Website

SHA-2 Hash Generator Online Tool

by CodeBeautify
Wider Reading Website

Instagram fined €405m over children's data…

by McCallum, S. and Gerken, T.
Wider Reading Other

Federal Information Processing Standards

by CSRC
Wider Reading Website

BBC - Home

by BBC
Wider Reading Website

Framework Documents | NIST

by National Institute of Standards and Technology

Lesson 7

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Wider Reading Website

Framework Documents | NIST

by National Institute of Standards and Technology
Wider Reading Website

Tesla recalls nearly 12,000 U.S. vehicles over…

by Shepardson, D.
Wider Reading Website

Password policy: updating your approach

by National Cyber Security Centre
Wider Reading Website

Protect | NIST

by National Institute of Standards and Technology
Wider Reading Website

OWASP Top Ten | OWASP Foundation

by OWASP Foundation

Lesson 8

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Website

Cyber Security Response and Recovery

by National Cyber Security Centre
Essential Resource Other

How prepared are you?

by HM Government
Wider Reading Other

Computer Security Incident Handling Guide

by Cichonski, P., Millar, T., Grance, T. and Scarfone, K.
Wider Reading Website

Cybersecurity Framework | NIST

by National Institute of Standards and Technology
Wider Reading Article

Data Snapshot: How well equipped are businesses…

by Tsai, P.
Wider Reading Website

incident - Glossary | CSRC

by National Institute of Standards and Technology

Lesson 9

Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Essential Resource Website

The Weak Link: Recent Supply Chain Attacks…

by Gihon, S.
Essential Resource Website

Azure Security | Microsoft Azure

by Microsoft
Essential Resource Website

Cloud Security – Amazon Web Services (AWS)

by Amazon Web Services
Essential Resource Website

The cloud security principles

by National Cyber Security Centre
Essential Resource Website

11 top cloud security threats

by Mello, J., Jr
Wider Reading Website

The principles of supply chain security - NCSC.…

by National Cyber Security Centre
Wider Reading Website

12 Cloud Security Issues: Risks, Threats &…

by Puzas, D.
Wider Reading Other

SP 800-145, The NIST Definition of Cloud…

by Mell, P. and Grance, T.
Wider Reading Website

Cloud security shared responsibility model

by National Cyber Security Centre
Wider Reading Website

Supply chain security guidance

by National Cyber Security Centre
Wider Reading Website

SolarWinds hack explained: Everything you need to…

by Oladimeji, S. and Kerner, S. M.
Wider Reading Other

Cybersecurity Supply Chain Risk Management…

by Boyens, J., Smith, A., Bartol, N., Winkler, K., Holbrook, A. and Fallon, M.

Lesson 10

Key Text eBook

Effective Cybersecurity: A Guide to Using Best…

by Stallings, W.
Key Text eBook

Cyber Security: The Complete Guide to Cyber…

by Sutton, D.
Wider Reading Website

Academic Skills | Arden Library

by Arden Library

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University logo 

© 2005-2025 Arden University  | All rights reserved