Topics from the CyBOK A-Z of KA indicative material for CyBOK v1.1.
Indicative material | Topic | CyBOK KA |
---|---|---|
ACCESS/ADMISSION CONTROL AND ID MANAGEMENT | CLASSES OF VULNERABILITIES AND THREATS | DSS |
ACCESS CONTROL | AUTHORISATION | AAA |
ADDRESSING THE CHALLENGES | CONSUMING CRYPTOGRAPHY | AC |
ADMISSION INTO EVIDENCE OF ELECTRONIC DOCUMENTS | DEMATERIALISATION OF DOCUMENTS AND ELECTRONIC TRUST SERVICES | LR |
AES | SCHEMES | C |
AFFILIATE PROGRAMMES | ELEMENTS OF A MALICIOUS OPERATION | AB |
AGILE AND DEVOPS | ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE | SSL |
AIR TRAFFIC COMMUNICATIONS NETWORKS | PHYSICAL LAYER SECURITY OF SELECTED COMMUNICATIONS TECHNOLOGIES | PLT |
ALERT CORRELATION | PLAN: SECURITY INFORMATION AND EVENT MANAGEMENT | SOIM |
ANALYSIS ENVIRONMENTS | MALWARE ANALYSIS | MAT |
ANALYSIS TECHNIQUES | MALWARE ANALYSIS | MAT |
ANOMALY DETECTION | ANALYSE: ANALYSIS METHODS | SOIM |
ANOMALY DETECTION | OS HARDENING | OSV |
ANTI-ANALYSIS AND EVASION TECHNIQUES | MALWARE ANALYSIS | MAT |
API ATTACKS ON SECURITY HARDWARE | HARDWARE | FMS |
API DESIGN | PREVENTION OF VULNERABILITIES | SS |
API DESIGN FOR CRYPTOGRAPHIC LIBRARIES | CRYPTOGRAPHIC IMPLEMENTATION | AC |
API VULNERABILITIES | CATEGORIES OF VULNERABILITIES | SS |
APPIFICATION | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
APPLICATION LOGS: WEB SERVER LOGS AND FILES | MONITOR: DATA SOURCES | SOIM |
APPLICATION STORES | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
APPLYING LAW TO CYBERSPACE AND INFORMATION TECHNOLOGIES | INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH | LR |
ARCHITECTURAL PRINCIPLES | FUNDAMENTAL CONCEPTS | SOIM |
ARM TRUSTZONE | HARDWARE SUPPORT FOR SOFTWARE SECURITY | HS |
ARTIFACTS AND FRAGMENTS | MAIN MEMORY FORENSICS | F |
ASSESSMENT CRITERIA | USABLE SECURITY | HF |
ATTACK DETECTION | MALWARE DETECTION | MAT |
ATTACKER MODELS | SECURITY GOALS AND ATTACKER MODELS | NS |
ATTACK ON CONFIDENTIALITY, INTEGRITY, AVAILABILITY | MALICIOUS ACTIVITIES BY MALWARE | MAT |
ATTACKS | SIDE CHANNEL ATTACKS AND FAULT ATTACKS | HS |
ATTACKS AND THEIR MITIGATION | ATTACKING P2P SYSTEMS | DSS |
ATTACKS ON PHYSICAL LAYER IDENTIFICATION | IDENTIFICATION | PLT |
ATTACK SURFACE | ATTACKER MODEL | OSV |
ATTACK TREES | MODELS | AB |
ATTACK TYPES | ATTACKING P2P SYSTEMS | DSS |
ATTRIBUTING ACTION TO A STATE UNDER INTERNATIONAL LAW | PUBLIC INTERNATIONAL LAW | LR |
ATTRIBUTION | MALWARE RESPONSE | MAT |
ATTRIBUTION | MODELS | AB |
AUDIT-BASED TRANSPARENCY | TRANSPARENCY | POR |
AUTHENTICATED ENCRYPTION (AE) SCHEMES | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
AUTHENTICATION | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
AUTHENTICATION AND IDENTIFICATION | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
AUTHENTICATION IN DISTRIBUTED SYSTEMS | AUTHENTICATION | AAA |
AUTHENTICATION PROTOCOLS | STANDARD PROTOCOLS | C |
AUTOMATED SOFTWARE DIVERSITY | MITIGATING EXPLOITATION | SS |
BASIC SECURITY DEFINITIONS | CRYPTOGRAPHIC SECURITY MODELS | C |
BLIND SIGNATURES | PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES | C |
BLOCK CIPHERS | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
BLOCK DEVICE ANALYSIS | OPERATING SYSTEM ANALYSIS | F |
BOARD LEVEL SECURITY | HARDWARE DESIGN PROCESS | HS |
BREACHES ARE COSTLY | MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE | SSL |
BREACH OF CONTRACT AND REMEDIES | CONTRACT | LR |
BSIMM | ASSESS THE SECURE SOFTWARE LIFECYCLE | SSL |
BUS NETWORKS | NETWORKING APPLICATIONS | NS |
CAPABILITIES | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
CASE STUDY: E.G., WEB BROWSERS | APPLICATION FORENSICS | F |
CATALOGUE OF INTELLECTUAL PROPERTY RIGHTS | INTELLECTUAL PROPERTY | LR |
CELL LEFT DELIBERATELY BLANK | THE CRYPTOGRAPHIC TRIUMVIRATE | AC |
CELL LEFT DELIBERATELY BLANKS | FUTURE OF APPLIED CRYPTOGRAPHY | AC |
CELLULAR NETWORKS | PHYSICAL LAYER SECURITY OF SELECTED COMMUNICATIONS TECHNOLOGIES | PLT |
CENSORSHIP RESISTANCE AND FREEDOM OF SPEECH | PRIVACY TECHNOLOGIES AND DEMOCRATIC VALUES | POR |
CHALLENGES OF LIVE FORENSICS | MAIN MEMORY FORENSICS | F |
CHARACTERISTICS | CYBER-PHYSICAL SYSTEMS | CPS |
CIRCUIT LEVEL TECHNIQUES | HARDWARE DESIGN PROCESS | HS |
CIVIL LAW | INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH | LR |
CLASSES OF DISRUPTIONS | COORDINATION CLASSES AND ATTACKABILITY | DSS |
CLASSIFICATION OF JAMMERS | JAMMING AND JAMMING-RESILIENT COMMUNICATIONS | PLT |
CLICKJACKING | CLIENT-SIDE VULNERABILITIES AND MITIGATIONS | WAM |
CLIENT-SIDE STORAGE | CLIENT-SIDE VULNERABILITIES AND MITIGATIONS | WAM |
CLOUD AND DATA CENTRE SECURITY | OTHER NETWORK SECURITY TOPICS | NS |
CLOUD COMPUTING | ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE | SSL |
CODE AND DATA INTEGRITY CHECKS | OS HARDENING | OSV |
CODES OF CONDUCT | ETHICS | LR |
CODING PRACTICES | PREVENTION OF VULNERABILITIES | SS |
COMMON CRITERIA | ASSESS THE SECURE SOFTWARE LIFECYCLE | SSL |
COMMON CRITERIA AND EMVCO | MEASURING HARDWARE SECURITY | HS |
COMPLETENESS | DETECTION OF VULNERABILITIES | SS |
COMPONENT VERSUS SYSTEMS PERSPECTIVES | RISK ASSESSMENT AND MANAGEMENT PRINCIPLES | RMG |
COMPROMISING EMANATIONS | COMPROMISING EMANATIONS AND SENSOR SPOOFING | PLT |
COMPUTATIONAL METHODS | CRYPTOGRAPHIC PROTOCOLS | FMS |
CONCEPTUAL MODELS | DEFINITIONS AND CONCEPTUAL MODELS | F |
CONFLICT OF LAW - CONTRACTS | CONTRACT | LR |
CONFLICT OF LAW – ELECTRONIC SIGNATURES AND TRUST SERVICES | DEMATERIALISATION OF DOCUMENTS AND ELECTRONIC TRUST SERVICES | LR |
CONNECTED NETWORKS AND THE INTERNET | NETWORKING APPLICATIONS | NS |
CONTACT TRACING À LA DP-3T | APPLIED CRYPTOGRAPHY IN ACTION | AC |
CONTRIBUTION OF SIEM TO ANALYSIS AND DETECTION | ANALYSE: ANALYSIS METHODS | SOIM |
CONTROL-FLOW RESTRICTIONS | OS HARDENING | OSV |
COOKIES | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
COORDINATED CLUSTERING ACROSS DISTRIBUTED RESOURCES AND SERVICES | CLASSES OF DISTRIBUTED SYSTEMS | DSS |
COORDINATED SPREAD SPECTRUM TECHNIQUES | JAMMING AND JAMMING-RESILIENT COMMUNICATIONS | PLT |
COORDINATION PRINCIPLES | COORDINATED RESOURCE CLUSTERING | DSS |
CORE CONCEPTS | ACCESS CONTROL IN DISTRIBUTED SYSTEMS | AAA |
CORE REGULATORY PRINCIPLES | DATA PROTECTION | LR |
COUNTERMEASURES | SIDE CHANNEL ATTACKS AND FAULT ATTACKS | HS |
COUNTERMEASURES | JAMMING AND JAMMING-RESILIENT COMMUNICATIONS | PLT |
CRIMES AGAINST INFORMATION SYSTEMS | COMPUTER CRIME | LR |
CRIMINAL LAW | INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH | LR |
CROSS-BORDER CRIMINAL INVESTIGATION | PUBLIC INTERNATIONAL LAW | LR |
CROSS-BORDER REGULATIONS | OTHER NETWORK SECURITY TOPICS | NS |
CRYPTOGRAPHIC ALGORITHMS AT RTL LEVEL | HARDWARE DESIGN FOR CRYPTOGRAPHIC ALGORITHMS | HS |
CRYPTOGRAPHIC DIVERSITY | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
CRYPTOGRAPHIC HASHING | CLOUD FORENSICS | F |
CRYPTOGRAPHIC LIBRARIES | CRYPTOGRAPHIC IMPLEMENTATION | AC |
CRYPTOGRAPHIC LIBRARIES | SOFTWARE AND LARGE SCALE SYSTEMS | FMS |
CRYPTOGRAPHY AND ACCESS CONTROL | ACCESS CONTROL IN DISTRIBUTED SYSTEMS | AAA |
CUSTOMERS DON’T APPLY PATCHES | MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE | SSL |
CVES AND CWES | CATEGORIES OF VULNERABILITIES | SS |
CYBER CONFLICT | POLICY AND POLITICAL ASPECTS | CPS |
CYBER-DEPENDENT ORGANISED CRIME | CHARACTERISATION OF ADVERSARIES | AB |
CYBER DOMAIN | DEFINITIONS AND CONCEPTUAL MODELS | F |
CYBER-ENABLED CRIME VS CYBER-DEPENDENT CRIME | CHARACTERISATION OF ADVERSARIES | AB |
CYBER-ENABLED ORGANISED CRIME | CHARACTERISATION OF ADVERSARIES | AB |
CYBER ESPIONAGE IN PEACETIME | PUBLIC INTERNATIONAL LAW | LR |
CYBER KILL CHAIN | MALICIOUS ACTIVITIES BY MALWARE | MAT |
CYBER SECURITY KNOWLEDGE MANAGEMENT | KNOWLEDGE: INTELLIGENCE AND ANALYSIS | SOIM |
CYBER-THREAT INTELLIGENCE | KNOWLEDGE: INTELLIGENCE AND ANALYSIS | SOIM |
DATA ACQUISITION | OPERATING SYSTEM ANALYSIS | F |
DATABASES | RELATED AREAS | OSV |
DATA COLLECTION | PLAN: SECURITY INFORMATION AND EVENT MANAGEMENT | SOIM |
DATA CONFIDENTIALITY | CONFIDENTIALITY | POR |
DATA RECOVERY AND FILE CONTENT CARVING | OPERATING SYSTEM ANALYSIS | F |
DATA SECURITY | CLASSES OF VULNERABILITIES AND THREATS | DSS |
DATA SOVEREIGNTY | JURISDICTION | LR |
DATA TRANSPORTATION | CLASSES OF VULNERABILITIES AND THREATS | DSS |
DECENTRALISED POINT-TO-POINT INTERACTIONS ACROSS DISTRIBUTED ENTITIES WITHOUT A CENTRALISED COORDINATION SERVICE | CLASSES OF DISTRIBUTED SYSTEMS | DSS |
DEFENCES | CRYPTOGRAPHIC IMPLEMENTATION | AC |
DEFINITION OF CYBER SECURITY | FOUNDATIONAL CONCEPTS | CI |
DEFINITIONS | DEFINITIONS AND CONCEPTUAL MODELS | F |
DELAY TOLERANT NETWORKS AND AD-HOC SENSORS NETWORKS | OTHER NETWORK SECURITY TOPICS | NS |
DE MINIMIS EXCEPTIONS TO CRIMES AGAINST INFORMATION SYSTEMS | COMPUTER CRIME | LR |
DES | SCHEMES | C |
DESIGN AND FABRICATION OF SILICON INTEGRATED CIRCUITS | HARDWARE DESIGN PROCESS | HS |
DESIGN CHOICES | ROLE OF OPERATING SYSTEMS | OSV |
DESIGN PROCESS | HARDWARE DESIGN FOR CRYPTOGRAPHIC ALGORITHMS | HS |
DETECTING ATTACKS | CROSS CUTTING SECURITY | CPS |
DEVELOPMENT OF STANDARDISED CRYPTOGRAPHY | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
DEVICE CAPABILITIES AND LIMITATIONS | FITTING THE TASK TO THE HUMAN | HF |
DEVICE FINGERPRINTS | IDENTIFICATION | PLT |
DEVICE UNDER IDENTIFICATION | IDENTIFICATION | PLT |
DIFFIE-HELLMAN KEY EXCHANGE | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
DIGITAL (FORENSIC) TRACE | DEFINITIONS AND CONCEPTUAL MODELS | F |
DIGITAL SIGNATURES | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
DIMENSIONS | MALWARE TAXONOMY | MAT |
DISRUPTING MALWARE OPERATIONS | MALWARE RESPONSE | MAT |
DISTANCE BOUNDING PROTOCOLS | DISTANCE BOUNDING AND SECURE POSITIONING | PLT |
DISTANCE MEASUREMENT TECHNIQUES | DISTANCE BOUNDING AND SECURE POSITIONING | PLT |
DISTRIBUTED LOGS | ACCOUNTABILITY | AAA |
DOS COUNTERMEASURES | NETWORK SECURITY TOOLS | NS |
DSA | SCHEMES | C |
DYNAMIC DETECTION | DETECTION OF VULNERABILITIES | SS |
ECOMMERCE | ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE | SSL |
EFFECTS OF CONTRACT ON NON-CONTRACTING PARTIES | CONTRACT | LR |
ELECTRIC POWER GRIDS | CYBER-PHYSICAL SYSTEMS DOMAINS | CPS |
ELECTRONIC SIGNATURES AND IDENTITY TRUST SERVICES | DEMATERIALISATION OF DOCUMENTS AND ELECTRONIC TRUST SERVICES | LR |
ELEMENTS OF RISK | RISK ASSESSMENT AND MANAGEMENT PRINCIPLES | RMG |
EMPLOYEES | STAKEHOLDER ENGAGEMENT | HF |
ENACTING SECURITY POLICY | RISK GOVERNANCE | RMG |
ENCOURAGING SECURITY STANDARDS VIA CONTRACT | CONTRACT | LR |
ENFORCEMENT AND PENALTIES | DATA PROTECTION | LR |
ENFORCEMENT JURISDICTION | JURISDICTION | LR |
ENFORCEMENT OF PRIVACY LAWS | PRIVACY LAWS IN GENERAL AND ELECTRONIC INTERCEPTION | LR |
ENFORCEMENT – REMEDIES | INTELLECTUAL PROPERTY | LR |
ENFORCING ACCESS CONTROL | AUTHORISATION | AAA |
ENVIRONMENTAL CRIMINOLOGY | MODELS | AB |
ERRONEOUS EXECUTION | PREVENTION OF VULNERABILITIES | SS |
EVASION AND COUNTERMEASURES | MALWARE DETECTION | MAT |
EVIDENCE AND PROOF | INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH | LR |
FACETS OF AUTHENTICATION | AUTHENTICATION | AAA |
FAILURES AND INCIDENTS | FOUNDATIONAL CONCEPTS | CI |
FEAR UNCERTAINTY AND DOUBT | POSITIVE SECURITY | HF |
FEDERATED ACCESS CONTROL | ACCESS CONTROL IN DISTRIBUTED SYSTEMS | AAA |
FEEDBACK-BASED TRANSPARENCY | TRANSPARENCY | POR |
FILE INFORMATION | MAIN MEMORY FORENSICS | F |
FILESYSTEM ANALYSIS | OPERATING SYSTEM ANALYSIS | F |
FIPS 140-2 | MEASURING HARDWARE SECURITY | HS |
FIREWALLING | NETWORK SECURITY TOOLS | NS |
FLOW OF CAPITAL | MODELS | AB |
FOLLOW UP: POST INCIDENT ACTIVITIES | HUMAN FACTORS: INCIDENT MANAGEMENT | SOIM |
FORENSICS CHALLENGES | CLOUD FORENSICS | F |
FORENSIC SCIENCE | DEFINITIONS AND CONCEPTUAL MODELS | F |
FORMAL VERIFICATION | OS HARDENING | OSV |
FREQUENT SOFTWARE UPDATES | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
FRIENDLY JAMMING | SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL | PLT |
FROM SCHEMES TO PROTOCOLS | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
FULL-STACK VERIFICATION | SOFTWARE AND LARGE SCALE SYSTEMS | FMS |
FULLY DISTRIBUTED NETWORKS: DHTS AND UNSTRUCTURED P2P NETWORKS | NETWORKING APPLICATIONS | NS |
FULLY HOMOMORPHIC ENCRYPTION | PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES | C |
FUNCTIONAL ELEMENTS | ATTACKING P2P SYSTEMS | DSS |
GNSS SECURITY AND SPOOFING ATTACKS | PHYSICAL LAYER SECURITY OF SELECTED COMMUNI- | PLT |
GOALS | PRIVACY ENGINEERING | POR |
GOALS AND TASKS | FITTING THE TASK TO THE HUMAN | HF |
GOVERNANCE MODELS | RISK GOVERNANCE | RMG |
GROUP SIGNATURES | PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES | C |
GRSECURITY | EMBRACING SECURITY | OSV |
HACKTIVISTS | CHARACTERISATION OF ADVERSARIES | AB |
HANDLE: ACTUAL INCIDENT RESPONSE | HUMAN FACTORS: INCIDENT MANAGEMENT | SOIM |
HARD PROBLEMS | CRYPTOGRAPHIC SECURITY MODELS | C |
HARDWARE DESIGN PROCESS | HARDWARE DESIGN CYCLE | HS |
HARDWARE SECURITY MODULE (HSM) | SECURE PLATFORMS | HS |
HARDWARE VERIFICATION | HARDWARE | FMS |
HASH FUNCTIONS | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
HIERARCHICAL P2P PROTOCOLS | DECENTRALISED P2P MODELS | DSS |
HOLISTIC APPROACHES TO LEGAL RISK ANALYSIS | INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH | LR |
HONEYPOTS AND HONEYNETS | KNOWLEDGE: INTELLIGENCE AND ANALYSIS | SOIM |
HUMAN BIASES | FITTING THE TASK TO THE HUMAN | HF |
HUMAN CAPABILITIES AND LIMITATIONS | FITTING THE TASK TO THE HUMAN | HF |
HUMAN FACTORS AND RISK COMMUNICATION | RISK GOVERNANCE | RMG |
HUMAN SERVICES | ELEMENTS OF A MALICIOUS OPERATION | AB |
HYBRID P2P PROTOCOLS | DECENTRALISED P2P MODELS | DSS |
IBM 4578 SECURE COPROCESSOR | HARDWARE SUPPORT FOR SOFTWARE SECURITY | HS |
IDENTIFICATION SIGNALS | IDENTIFICATION | PLT |
IDENTIFYING THE ANALYSIS ENVIRONMENT | MALWARE ANALYSIS | MAT |
IDENTIFYING THE PRESENCE OF MALWARE | MALWARE DETECTION | MAT |
IDENTITY-BASED ENCRYPTION | PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES | C |
IDENTITY MANAGEMENT | AUTHENTICATION | AAA |
IMPLEMENTATION CHALLENGES | CRYPTOGRAPHIC IMPLEMENTATION | AC |
INADEQUACY OF TRADITIONAL DEVELOPMENT METHODS | MOTIVATION | FMS |
INCENTIVES AND REGULATION | POLICY AND POLITICAL ASPECTS | CPS |
INDUSTRIAL CONTROL SYSTEMS | CYBER-PHYSICAL SYSTEMS DOMAINS | CPS |
INDUSTRY PRACTICES AND STANDARDS | POLICY AND POLITICAL ASPECTS | CPS |
INDUSTRY-SPECIFIC REGULATIONS | OTHER REGULATORY MATTERS | LR |
INFECTION VECTORS | ELEMENTS OF A MALICIOUS OPERATION | AB |
INFORMATION FLOW | PREVENTION OF VULNERABILITIES | SS |
INFORMATION FLOW CONTROL | SOFTWARE AND LARGE SCALE SYSTEMS | FMS |
INFORMATION HARDENING | OS HARDENING | OSV |
INFRASTRUCTURE | ELEMENTS OF A MALICIOUS OPERATION | AB |
INJECTION VULNERABILITIES | SERVER-SIDE VULNERABILITIES AND MITIGATIONS | WAM |
INTERACTION CONTEXT | FITTING THE TASK TO THE HUMAN | HF |
INTERCEPTION BY A STATE | PRIVACY LAWS IN GENERAL AND ELECTRONIC INTERCEPTION | LR |
INTERCEPTION BY PERSONS OTHER THAN STATE | PRIVACY LAWS IN GENERAL AND ELECTRONIC INTERCEPTION | LR |
INTERNATIONAL NORMS | PRIVACY LAWS IN GENERAL AND ELECTRONIC INTERCEPTION | LR |
INTERNATIONAL TREATMENT AND CONFLICT OF LAW | INTELLECTUAL PROPERTY | LR |
INTERPERSONAL CRIMES | CHARACTERISATION OF ADVERSARIES | AB |
INTRUSION DETECTION AND PREVENTION SYSTEMS | NETWORK SECURITY TOOLS | NS |
INTRUSION PREVENTION SYSTEMS | EXECUTE: MITIGATION AND COUNTERMEASURES | SOIM |
INVESTIGATION AND PREVENTION OF CRIME | DATA PROTECTION | LR |
IOT | ROLE OF OPERATING SYSTEMS | OSV |
IOT | ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE | SSL |
IOT | CYBER-PHYSICAL SYSTEMS DOMAINS | CPS |
ISO/IEC 27035 | BUSINESS CONTINUITY: INCIDENT RESPONSE AND RECOVERY PLANNING | RMG |
ISOLATION | ROLE OF OPERATING SYSTEMS | OSV |
KERBEROS | SCHEMES | C |
KEY AGREEMENT PROTOCOLS | STANDARD PROTOCOLS | C |
KEY DERIVATION | KEY MANAGEMENT | AC |
KEY ESTABLISHMENT BASED ON CHANNEL RECIPROCITY | SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL | PLT |
KEY GENERATION | KEY MANAGEMENT | AC |
KEY SIZES | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
KEY STORAGE | KEY MANAGEMENT | AC |
KEY TRANSPORTATION | KEY MANAGEMENT | AC |
KILL CHAINS | MODELS | AB |
KINDS | MALWARE TAXONOMY | MAT |
LANGUAGE DESIGN AND TYPE SYSTEMS | PREVENTION OF VULNERABILITIES | SS |
LATENT DESIGN CONDITIONS | PRINCIPLES | CI |
LATENT USABILITY FAILURES | HUMAN ERROR | HF |
LEGAL CONCERNS AND THE DAUBERT STANDARD | DEFINITIONS AND CONCEPTUAL MODELS | F |
LEVELS OF PERCEIVED RISK | RISK DEFINITIONS | RMG |
LIABILITY AND COURTS | INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH | LR |
LIGHTWEIGHT SOLUTIONS | HARDWARE SUPPORT FOR SOFTWARE SECURITY | HS |
LIMITATIONS | MOTIVATION | FMS |
LIMITATIONS OF LIABILITY AND EXCLUSIONS OF LIABILITY | CONTRACT | LR |
LIMITING PRIVILEGES | MITIGATING EXPLOITATION | SS |
LINEARLY HOMOMORPHIC ENCRYPTION | PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES | C |
LOCAL AREA NETWORKS (LANS) | NETWORKING APPLICATIONS | NS |
LOGICS AND SPECIFICATION LANGUAGES | FOUNDATIONS, METHODS AND TOOLS | FMS |
LONG-TERM MEMORY | FITTING THE TASK TO THE HUMAN | HF |
LOW-END DEVICES AND IOT | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
LOW-LEVEL CODE | SOFTWARE AND LARGE SCALE SYSTEMS | FMS |
LPI AND COVERT COMMUNICATION | SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL | PLT |
MACHINE LEARNING | ANALYSE: ANALYSIS METHODS | SOIM |
MAKING CRYPTOGRAPHY INVISIBLE | CONSUMING CRYPTOGRAPHY | AC |
MANAGING PUBLIC KEYS AND PUBLIC KEY INFRASTRUCTURE | KEY MANAGEMENT | AC |
MATTERS CLASSIFIED AS SECRET BY A STATE | OTHER REGULATORY MATTERS | LR |
MEDIATION | ROLE OF OPERATING SYSTEMS | OSV |
MEDICAL DEVICES | CYBER-PHYSICAL SYSTEMS DOMAINS | CPS |
MEMORY MANAGEMENT VULNERABILITIES | CATEGORIES OF VULNERABILITIES | SS |
MEMORY PROTECTION AND ADDRESS SPACES | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
MENTAL MODELS OF CYBER RISKS AND DEFENCES | AWARENESS AND EDUCATION | HF |
MENTAL MODELS OF SECURITY | USABLE SECURITY | HF |
MESSAGE AUTHENTICATION CODE (MAC) SCHEMES | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
METADATA CONFIDENTIALITY | CONFIDENTIALITY | POR |
MICROSOFT SDL | PRESCRIPTIVE PROCESSES | SSL |
MIMO-SUPPORTED APPROACHES | SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL | PLT |
MISUSE DETECTION | ANALYSE: ANALYSIS METHODS | SOIM |
MITIGATING ATTACKS | CROSS CUTTING SECURITY | CPS |
MOBILE | ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE | SSL |
MODERN HARDWARE EXTENSIONS FOR MEMORY PROTECTION | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
MULTICS | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
NATURE OF LAW AND LEGAL ANALYSIS | INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH | LR |
NCSC GUIDANCE | BUSINESS CONTINUITY: INCIDENT RESPONSE AND RECOVERY PLANNING | RMG |
NEEDS OF SPECIFIC GROUPS | FITTING THE TASK TO THE HUMAN | HF |
NETWORK ACCESS CONTROL | NETWORK SECURITY TOOLS | NS |
NETWORK AGGREGATES: NETFLOW | MONITOR: DATA SOURCES | SOIM |
NETWORK CONNECTIONS | MAIN MEMORY FORENSICS | F |
NETWORK COVERT CHANNELS | OTHER NETWORK SECURITY TOPICS | NS |
NETWORK INFRASTRUCTURE INFORMATION | MONITOR: DATA SOURCES | SOIM |
NETWORKING INFRASTRUCTURE SECURITY | OTHER NETWORK SECURITY TOPICS | NS |
NETWORK SECURITY MONITORING | NETWORK SECURITY TOOLS | NS |
NETWORK TRAFFIC | MONITOR: DATA SOURCES | SOIM |
NEW APPROACHES | AWARENESS AND EDUCATION | HF |
NEWER PRINCIPLES | OS SECURITY PRINCIPLES | OSV |
NFC | PHYSICAL LAYER SECURITY OF SELECTED COMMUNICATIONS TECHNOLOGIES | PLT |
NIST PRINCIPLES | PRINCIPLES | CI |
OBJECTIVES | HARDWARE SUPPORT FOR SOFTWARE SECURITY | HS |
OBJECTIVES OF CYBER SECURITY | FOUNDATIONAL CONCEPTS | CI |
OBLIGATIONS OWED TO A CLIENT | ETHICS | LR |
OBLIVIOUS TRANSFER | ADVANCED PROTOCOLS | C |
ONE-TIME PAD | INFORMATION-THEORETICALLY SECURE CONSTRUCTIONS | C |
ON-LINE CONTRACTS | CONTRACT | LR |
OPERATING SYSTEMS | SOFTWARE AND LARGE SCALE SYSTEMS | FMS |
ORIGIN-BASED POLICIES | ACCESS CONTROL IN DISTRIBUTED SYSTEMS | AAA |
PARTITIONING | OS HARDENING | OSV |
PASSWORD BASED KEY DERIVATION | KEY MANAGEMENT | AC |
PASSWORDS AND ALTERNATIVES | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
PATCHING CAN INTRODUCE VULNERABILITIES | MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE | SSL |
PAX TEAM | EMBRACING SECURITY | OSV |
PAYMENT METHODS | ELEMENTS OF A MALICIOUS OPERATION | AB |
PAYMENT NETWORKS | OTHER NETWORK SECURITY TOPICS | NS |
PEOPLE ARE NOT THE WEAKEST LINK | POSITIVE SECURITY | HF |
PERMISSION DIALOG BASED ACCESS CONTROL | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
PERSONAL DATA BREACH NOTIFICATION | DATA PROTECTION | LR |
PHISHING | CLIENT-SIDE VULNERABILITIES AND MITIGATIONS | WAM |
PHYSICAL ACCESS AND SECURE DELETION | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
PHYSICAL ATTACKS | CLIENT-SIDE VULNERABILITIES AND MITIGATIONS | WAM |
PHYSICAL LAYER ATTACKS ON SECURE DISTANCE MEASUREMENT | DISTANCE BOUNDING AND SECURE POSITIONING | PLT |
PHYSICAL LAYER SECURITY | OTHER NETWORK SECURITY TOPICS | NS |
PHYSICALLY UNCLONABLE FUNCTIONS (PUFS) | ENTROPY GENERATING BUILDING BLOCKS | HS |
PKCS | SCHEMES | C |
POLICY ANALYSIS | CONFIGURATION | FMS |
POST-QUANTUM CRYPTOGRAPHY | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
POTENTIALLY UNWANTED PROGRAMS | MALWARE TAXONOMY | MAT |
PRECAUTIONARY PRINCIPLE | PRINCIPLES | CI |
PREPARE: INCIDENT MANAGEMENT PLANNING | HUMAN FACTORS: INCIDENT MANAGEMENT | SOIM |
PRESCRIPTIVE JURISDICTION | JURISDICTION | LR |
PREVENTING ATTACKS | CROSS CUTTING SECURITY | CPS |
PRINCIPLES | DECENTRALISED P2P MODELS | DSS |
PRIVACY AND ACCOUNTABILITY | ACCOUNTABILITY | AAA |
PRIVACY EVALUATION | PRIVACY ENGINEERING | POR |
PRIVACY POLICY INTERPRETABILITY | CONTROL | POR |
PRIVACY POLICY NEGOTIATION | CONTROL | POR |
PRIVACY SETTINGS CONFIGURATION | CONTROL | POR |
PRIVACY TECHNOLOGIES AS SUPPORT TO DEMOCRATIC POLITICAL SYSTEMS | PRIVACY TECHNOLOGIES AND DEMOCRATIC VALUES | POR |
PROCESS INFORMATION | MAIN MEMORY FORENSICS | F |
PROPERTIES OF SYSTEMS AND THEIR EXECUTION | FOUNDATIONS, METHODS AND TOOLS | FMS |
PROPERTY CHECKING | FOUNDATIONS, METHODS AND TOOLS | FMS |
PROTECTED MODULE ARCHITECTURES | HARDWARE SUPPORT FOR SOFTWARE SECURITY | HS |
PROTECTING DATA INTEGRITY | SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL | PLT |
PROTECTION AGAINST NATURAL EVENTS AND ACCIDENTS | CYBER-PHYSICAL SYSTEMS | CPS |
PROTECTION RINGS | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
PUBLIC-KEY ENCRYPTION | PUBLIC-KEY CRYPTOGRAPHY | C |
PUBLIC KEY ENCRYPTION SCHEMES AND KEY ENCAPSULATION MECHANISMS | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
PUBLIC-KEY SIGNATURES | PUBLIC-KEY CRYPTOGRAPHY | C |
QUANTUM KEY DISTRIBUTION | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
RACE CONDITION MITIGATIONS | PREVENTION OF VULNERABILITIES | SS |
RACE CONDITION VULNERABILITIES | CATEGORIES OF VULNERABILITIES | SS |
RANDOM BIT GENERATION | CRYPTOGRAPHIC IMPLEMENTATION | AC |
RANDOM NUMBER GENERATION | ENTROPY GENERATING BUILDING BLOCKS | HS |
REFRESHING KEYS AND FORWARD SECURITY | KEY MANAGEMENT | AC |
RELIABLE AND SECURE GROUP COMMUNICATIONS | COORDINATED RESOURCE CLUSTERING | DSS |
REPLICATION MANAGEMENT AND COORDINATION SCHEMA | COORDINATED RESOURCE CLUSTERING | DSS |
REQUIREMENTS OF FORM AND THE THREAT OF UNENFORCEABILITY | DEMATERIALISATION OF DOCUMENTS AND ELECTRONIC TRUST SERVICES | LR |
RESEARCH AND DEVELOPMENT ACTIVITIES CONDUCTED BY NON-STATE PERSONS | COMPUTER CRIME | LR |
RESOURCE COORDINATION CLASS | COORDINATION CLASSES AND ATTACKABILITY | DSS |
RESOURCE MANAGEMENT AND COORDINATION SERVICES | CLASSES OF VULNERABILITIES AND THREATS | DSS |
RESTRICTIONS ON EXPORTING SECURITY TECHNOLOGIES | OTHER REGULATORY MATTERS | LR |
REVERSE ENGINEERING | INTELLECTUAL PROPERTY | LR |
RING SIGNATURES | PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES | C |
RISK ASSESSMENT | RISK DEFINITIONS | RMG |
RISK ASSESSMENT AND MANAGEMENT IN CYBER-PHYSICAL SYSTEMS | RISK ASSESSMENT AND MANAGEMENT PRINCIPLES | RMG |
RISK ASSESSMENT AND MANAGEMENT METHODS | RISK ASSESSMENT AND MANAGEMENT PRINCIPLES | RMG |
RISK MANAGEMENT | FOUNDATIONAL CONCEPTS | CI |
RISK MANAGEMENT | RISK DEFINITIONS | RMG |
RISK PERCEPTION FACTORS | RISK GOVERNANCE | RMG |
ROAD VEHICLES | ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE | SSL |
ROBOTICS AND ADVANCED MANUFACTURING | CYBER-PHYSICAL SYSTEMS DOMAINS | CPS |
ROOT OF TRUST | HARDWARE DESIGN CYCLE | HS |
RSA | SCHEMES | C |
RUNTIME DETECTION OF ATTACKS | MITIGATING EXPLOITATION | SS |
SAAS FORENSICS | CLOUD FORENSICS | F |
SAFECODE | PRESCRIPTIVE PROCESSES | SSL |
SALTZER AND SCHROEDER PRINCIPLES | PRINCIPLES | CI |
SALTZER AND SCHROEDER’S PRINCIPLES | OS SECURITY PRINCIPLES | OSV |
SAMM | ASSESS THE SECURE SOFTWARE LIFECYCLE | SSL |
SANDBOXING | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
SDN AND NFV SECURITY | NETWORK SECURITY TOOLS | NS |
SECRECY CAPACITY | SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL | PLT |
SECRET SHARING | INFORMATION-THEORETICALLY SECURE CONSTRUCTIONS | C |
SECURE ELEMENT AND SMARTCARD | SECURE PLATFORMS | HS |
SECURE MESSAGING | APPLIED CRYPTOGRAPHY IN ACTION | AC |
SECURE MULTI-PARTY COMPUTATION | ADVANCED PROTOCOLS | C |
SECURE POSITIONING | DISTANCE BOUNDING AND SECURE POSITIONING | PLT |
SECURITY AND PRIVACY CONCERNS | CYBER-PHYSICAL SYSTEMS | CPS |
SECURITY ARCHITECTURE AND LIFECYCLE | CROSS-CUTTING THEMES | CI |
SECURITY AT THE APPLICATION LAYER | NETWORK PROTOCOLS AND THEIR SECURITY | NS |
SECURITY AT THE INTERNET LAYER | NETWORK PROTOCOLS AND THEIR SECURITY | NS |
SECURITY AT THE TRANSPORT LAYER | NETWORK PROTOCOLS AND THEIR SECURITY | NS |
SECURITY CULTURE | RISK GOVERNANCE | RMG |
SECURITY DOMAINS | ROLE OF OPERATING SYSTEMS | OSV |
SECURITY ECONOMICS | CROSS-CUTTING THEMES | CI |
SECURITY GOALS IN NETWORKED SYSTEMS | SECURITY GOALS AND ATTACKER MODELS | NS |
SECURITY HYGIENE | HUMAN ERROR | HF |
SECURITY METRICS | RISK ASSESSMENT AND MANAGEMENT PRINCIPLES | RMG |
SECURITY MODELS | OS SECURITY PRINCIPLES | OSV |
SECURITY ON LINK LAYER | NETWORK PROTOCOLS AND THEIR SECURITY | NS |
SECURITY OPERATIONS AND BENCHMARKING | PLAN: SECURITY INFORMATION AND EVENT MANAGEMENT | SOIM |
SELF-HELP DISFAVOURED: SOFTWARE LOCKS AND HACK-BACK | COMPUTER CRIME | LR |
SENSOR COMPROMISE | COMPROMISING EMANATIONS AND SENSOR SPOOFING | PLT |
SERVER-SIDE MISCONFIGURATION AND VULNERABLE COMPONENTS | SERVER-SIDE VULNERABILITIES AND MITIGATIONS | WAM |
SERVICES | CLOUD FORENSICS | F |
SERVICES COORDINATION CLASS | COORDINATION CLASSES AND ATTACKABILITY | DSS |
SESIP | MEASURING HARDWARE SECURITY | HS |
SETUP ASSUMPTIONS | CRYPTOGRAPHIC SECURITY MODELS | C |
SHADOW SECURITY | HUMAN ERROR | HF |
SHIELDS FROM LIABILITY | INTERNET INTERMEDIARIES | LR |
SHORT-TERM MEMORY | FITTING THE TASK TO THE HUMAN | HF |
SIDE CHANNELS | HARDWARE | FMS |
SIDE CHANNEL VULNERABILITIES | CATEGORIES OF VULNERABILITIES | SS |
SIEM PLATFORMS AND COUNTERMEASURES | EXECUTE: MITIGATION AND COUNTERMEASURES | SOIM |
SIGMA PROTOCOLS | ADVANCED PROTOCOLS | C |
SIGNAL ANNIHILATION AND OVERSHADOWING | JAMMING AND JAMMING-RESILIENT COMMUNICATIONS | PLT |
SIMULATION OF CRYPTOGRAPHIC OPERATIONS | CRYPTOGRAPHIC SECURITY MODELS | C |
SITE RELIABILITY ENGINEERING | EXECUTE: MITIGATION AND COUNTERMEASURES | SOIM |
SITUATIONAL AWARENESS | KNOWLEDGE: INTELLIGENCE AND ANALYSIS | SOIM |
SOAR: IMPACT AND RISK ASSESSMENT | EXECUTE: MITIGATION AND COUNTERMEASURES | SOIM |
SOFTWARE-DEFINED NETWORKING AND NETWORK FUNCTION VIRTUALISATION | NETWORKING APPLICATIONS | NS |
SOFTWARE DEVELOPERS | STAKEHOLDER ENGAGEMENT | HF |
SOUNDNESS | DETECTION OF VULNERABILITIES | SS |
SPECIALISED SERVICES | ELEMENTS OF A MALICIOUS OPERATION | AB |
SPECIFICATION-BASED SYNTHESIS | CONFIGURATION | FMS |
STATE ACTORS | CHARACTERISATION OF ADVERSARIES | AB |
STATE CYBER OPERATIONS IN GENERAL | PUBLIC INTERNATIONAL LAW | LR |
STATIC DETECTION | DETECTION OF VULNERABILITIES | SS |
STOCHASTIC METHODS | CRYPTOGRAPHIC PROTOCOLS | FMS |
STORAGE FORENSICS | OPERATING SYSTEM ANALYSIS | F |
STRATEGIES | PRIVACY ENGINEERING | POR |
STREAM CIPHERS | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
STRUCTURED OUTPUT GENERATIONS MITIGATIONS | PREVENTION OF VULNERABILITIES | SS |
STRUCTURED OUTPUT GENERATIONS VULNERABILITIES | CATEGORIES OF VULNERABILITIES | SS |
STRUCTURED P2P PROTOCOLS | DECENTRALISED P2P MODELS | DSS |
SUBJECT MATTER AND REGULATORY FOCUS | DATA PROTECTION | LR |
SYMBOLIC METHODS | CRYPTOGRAPHIC PROTOCOLS | FMS |
SYMMETRIC ENCRYPTION AND AUTHENTICATION | SYMMETRIC CRYPTOGRAPHY | C |
SYMMETRIC PRIMITIVES | SYMMETRIC CRYPTOGRAPHY | C |
SYSLOG | MONITOR: DATA SOURCES | SOIM |
SYSTEM AND KERNEL LOGS | MONITOR: DATA SOURCES | SOIM |
SYSTEMS COORDINATION STYLES | COORDINATED RESOURCE CLUSTERING | DSS |
TAKE-DOWN PROTECTION | INTERNET INTERMEDIARIES | LR |
TECHNICAL ASPECTS | ACCOUNTABILITY | AAA |
TERMS | AWARENESS AND EDUCATION | HF |
TESTING AND VALIDATING INTRUSION DETECTION SYSTEMS | ANALYSE: ANALYSIS METHODS | SOIM |
THE ADVERSARY | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
THE BASE-RATE FALLACY | ANALYSE: ANALYSIS METHODS | SOIM |
THE CHALLENGES OF CONSUMING CRYPTOGRAPHY | CONSUMING CRYPTOGRAPHY | AC |
THE ENFORCEMENT OF, AND PENALTIES FOR, CRIMES AGAINST INFORMATION SYSTEMS | COMPUTER CRIME | LR |
THE KEY LIFECYCLE | KEY MANAGEMENT | AC |
THE LAW OF ARMED CONFLICT | PUBLIC INTERNATIONAL LAW | LR |
THEORY | AUTHORISATION | AAA |
THE ROLE OF FORMAL SECURITY DEFINITIONS AND PROOFS | ALGORITHMS, SCHEMES AND PROTOCOLS | AC |
THINKING FAST AND SLOW | HUMAN ERROR | HF |
THREAT MODEL | HARDWARE DESIGN CYCLE | HS |
THREATS TO SECURITY FOR MODERN OSS | ATTACKER MODEL | OSV |
TIME | HARDWARE DESIGN PROCESS | HS |
TLS | SCHEMES | C |
TOUCHPOINTS | PRESCRIPTIVE PROCESSES | SSL |
TOWARDS MORE SCIENTIFIC DEVELOPMENT METHODS | MOTIVATION | FMS |
TRANSPORTATION SYSTEMS AND AUTONOMOUS VEHICLES | CYBER-PHYSICAL SYSTEMS DOMAINS | CPS |
TRANSPORT LAYER SECURITY | APPLIED CRYPTOGRAPHY IN ACTION | AC |
TROJAN CIRCUITS | HARDWARE DESIGN PROCESS | HS |
TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA | PRIMITIVES FOR ISOLATION AND MEDIATION | OSV |
TRUSTED COMPUTING | MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE | SSL |
TRUSTED EXECUTION ENVIRONMENT | HARDWARE SUPPORT FOR SOFTWARE SECURITY | HS |
TRUSTED PLATFORM MODULE (TPM) | SECURE PLATFORMS | HS |
UNCOORDINATED SPREAD SPECTRUM TECHNIQUES | JAMMING AND JAMMING-RESILIENT COMMUNICATIONS | PLT |
UNDERGROUND ECO-SYSTEM | MALICIOUS ACTIVITIES BY MALWARE | MAT |
UNDERSTANDING INTELLECTUAL PROPERTY | INTELLECTUAL PROPERTY | LR |
UNIVERSAL COMPOSABILITY | CRYPTOGRAPHIC SECURITY MODELS | C |
UNSTRUCTURED P2P PROTOCOLS | DECENTRALISED P2P MODELS | DSS |
USER AUTHENTICATION | AUTHENTICATION | AAA |
VERIFICATION AND FORMAL METHODS | CROSS-CUTTING THEMES | CI |
VIRTUAL MACHINES | ROLE OF OPERATING SYSTEMS | OSV |
VIRTUAL MACHINES | HARDWARE SUPPORT FOR SOFTWARE SECURITY | HS |
VULNERABILITIES CAN BE EXPLOITED WITHOUT BEING NOTICED | MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE | SSL |
VULNERABILITY MANAGEMENT | RISK ASSESSMENT AND MANAGEMENT PRINCIPLES | RMG |
VULNERABILITY TESTING | ETHICS | LR |
WARRANTED STATE ACTIVITY | COMPUTER CRIME | LR |
WARRANTIES AND THEIR EXCLUSION | CONTRACT | LR |
WEB-BASED APPLICATIONS | SOFTWARE AND LARGE SCALE SYSTEMS | FMS |
WEBIFICATION | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
WEB PKI AND HTTPS | FUNDAMENTAL CONCEPTS AND APPROACHES | WAM |
WIRELESS NETWORKS | NETWORKING APPLICATIONS | NS |
WORKFLOWS AND VOCABULARY | FUNDAMENTAL CONCEPTS | SOIM |
ZERO KNOWLEDGE | ADVANCED PROTOCOLS | C |
ZERO TRUST NETWORKING | NETWORK SECURITY TOOLS | NS |
CyBOK © Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence: https://www.nationalarchives.gov.uk/doc/open-government-licence/.