Topics from the CyBOK A-Z of KA indicative material for CyBOK v1.1.

Indicative material Topic CyBOK KA
ACCESS/ADMISSION CONTROL AND ID MANAGEMENT CLASSES OF VULNERABILITIES AND THREATS DSS
ACCESS CONTROL AUTHORISATION AAA
ADDRESSING THE CHALLENGES CONSUMING CRYPTOGRAPHY AC
ADMISSION INTO EVIDENCE OF ELECTRONIC DOCUMENTS DEMATERIALISATION OF DOCUMENTS AND ELECTRONIC TRUST SERVICES LR
AES SCHEMES C
AFFILIATE PROGRAMMES ELEMENTS OF A MALICIOUS OPERATION AB
AGILE AND DEVOPS ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE SSL
AIR TRAFFIC COMMUNICATIONS NETWORKS PHYSICAL LAYER SECURITY OF SELECTED COMMUNICATIONS TECHNOLOGIES PLT
ALERT CORRELATION PLAN: SECURITY INFORMATION AND EVENT MANAGEMENT SOIM
ANALYSIS ENVIRONMENTS MALWARE ANALYSIS MAT
ANALYSIS TECHNIQUES MALWARE ANALYSIS MAT
ANOMALY DETECTION ANALYSE: ANALYSIS METHODS SOIM
ANOMALY DETECTION OS HARDENING OSV
ANTI-ANALYSIS AND EVASION TECHNIQUES MALWARE ANALYSIS MAT
API ATTACKS ON SECURITY HARDWARE HARDWARE FMS
API DESIGN PREVENTION OF VULNERABILITIES SS
API DESIGN FOR CRYPTOGRAPHIC LIBRARIES CRYPTOGRAPHIC IMPLEMENTATION AC
API VULNERABILITIES CATEGORIES OF VULNERABILITIES SS
APPIFICATION FUNDAMENTAL CONCEPTS AND APPROACHES WAM
APPLICATION LOGS: WEB SERVER LOGS AND FILES MONITOR: DATA SOURCES SOIM
APPLICATION STORES FUNDAMENTAL CONCEPTS AND APPROACHES WAM
APPLYING LAW TO CYBERSPACE AND INFORMATION TECHNOLOGIES INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH LR
ARCHITECTURAL PRINCIPLES FUNDAMENTAL CONCEPTS SOIM
ARM TRUSTZONE HARDWARE SUPPORT FOR SOFTWARE SECURITY HS
ARTIFACTS AND FRAGMENTS MAIN MEMORY FORENSICS F
ASSESSMENT CRITERIA USABLE SECURITY HF
ATTACK DETECTION MALWARE DETECTION MAT
ATTACKER MODELS SECURITY GOALS AND ATTACKER MODELS NS
ATTACK ON CONFIDENTIALITY, INTEGRITY, AVAILABILITY MALICIOUS ACTIVITIES BY MALWARE MAT
ATTACKS SIDE CHANNEL ATTACKS AND FAULT ATTACKS HS
ATTACKS AND THEIR MITIGATION ATTACKING P2P SYSTEMS DSS
ATTACKS ON PHYSICAL LAYER IDENTIFICATION IDENTIFICATION PLT
ATTACK SURFACE ATTACKER MODEL OSV
ATTACK TREES MODELS AB
ATTACK TYPES ATTACKING P2P SYSTEMS DSS
ATTRIBUTING ACTION TO A STATE UNDER INTERNATIONAL LAW PUBLIC INTERNATIONAL LAW LR
ATTRIBUTION MALWARE RESPONSE MAT
ATTRIBUTION MODELS AB
AUDIT-BASED TRANSPARENCY TRANSPARENCY POR
AUTHENTICATED ENCRYPTION (AE) SCHEMES ALGORITHMS, SCHEMES AND PROTOCOLS AC
AUTHENTICATION FUNDAMENTAL CONCEPTS AND APPROACHES WAM
AUTHENTICATION AND IDENTIFICATION PRIMITIVES FOR ISOLATION AND MEDIATION OSV
AUTHENTICATION IN DISTRIBUTED SYSTEMS AUTHENTICATION AAA
AUTHENTICATION PROTOCOLS STANDARD PROTOCOLS C
AUTOMATED SOFTWARE DIVERSITY MITIGATING EXPLOITATION SS
BASIC SECURITY DEFINITIONS CRYPTOGRAPHIC SECURITY MODELS C
BLIND SIGNATURES PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES C
BLOCK CIPHERS ALGORITHMS, SCHEMES AND PROTOCOLS AC
BLOCK DEVICE ANALYSIS OPERATING SYSTEM ANALYSIS F
BOARD LEVEL SECURITY HARDWARE DESIGN PROCESS HS
BREACHES ARE COSTLY MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE SSL
BREACH OF CONTRACT AND REMEDIES CONTRACT LR
BSIMM ASSESS THE SECURE SOFTWARE LIFECYCLE SSL
BUS NETWORKS NETWORKING APPLICATIONS NS
CAPABILITIES PRIMITIVES FOR ISOLATION AND MEDIATION OSV
CASE STUDY: E.G., WEB BROWSERS APPLICATION FORENSICS F
CATALOGUE OF INTELLECTUAL PROPERTY RIGHTS INTELLECTUAL PROPERTY LR
CELL LEFT DELIBERATELY BLANK THE CRYPTOGRAPHIC TRIUMVIRATE AC
CELL LEFT DELIBERATELY BLANKS FUTURE OF APPLIED CRYPTOGRAPHY AC
CELLULAR NETWORKS PHYSICAL LAYER SECURITY OF SELECTED COMMUNICATIONS TECHNOLOGIES PLT
CENSORSHIP RESISTANCE AND FREEDOM OF SPEECH PRIVACY TECHNOLOGIES AND DEMOCRATIC VALUES POR
CHALLENGES OF LIVE FORENSICS MAIN MEMORY FORENSICS F
CHARACTERISTICS CYBER-PHYSICAL SYSTEMS CPS
CIRCUIT LEVEL TECHNIQUES HARDWARE DESIGN PROCESS HS
CIVIL LAW INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH LR
CLASSES OF DISRUPTIONS COORDINATION CLASSES AND ATTACKABILITY DSS
CLASSIFICATION OF JAMMERS JAMMING AND JAMMING-RESILIENT COMMUNICATIONS PLT
CLICKJACKING CLIENT-SIDE VULNERABILITIES AND MITIGATIONS WAM
CLIENT-SIDE STORAGE CLIENT-SIDE VULNERABILITIES AND MITIGATIONS WAM
CLOUD AND DATA CENTRE SECURITY OTHER NETWORK SECURITY TOPICS NS
CLOUD COMPUTING ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE SSL
CODE AND DATA INTEGRITY CHECKS OS HARDENING OSV
CODES OF CONDUCT ETHICS LR
CODING PRACTICES PREVENTION OF VULNERABILITIES SS
COMMON CRITERIA ASSESS THE SECURE SOFTWARE LIFECYCLE SSL
COMMON CRITERIA AND EMVCO MEASURING HARDWARE SECURITY HS
COMPLETENESS DETECTION OF VULNERABILITIES SS
COMPONENT VERSUS SYSTEMS PERSPECTIVES RISK ASSESSMENT AND MANAGEMENT PRINCIPLES RMG
COMPROMISING EMANATIONS COMPROMISING EMANATIONS AND SENSOR SPOOFING PLT
COMPUTATIONAL METHODS CRYPTOGRAPHIC PROTOCOLS FMS
CONCEPTUAL MODELS DEFINITIONS AND CONCEPTUAL MODELS F
CONFLICT OF LAW - CONTRACTS CONTRACT LR
CONFLICT OF LAW – ELECTRONIC SIGNATURES AND TRUST SERVICES DEMATERIALISATION OF DOCUMENTS AND ELECTRONIC TRUST SERVICES LR
CONNECTED NETWORKS AND THE INTERNET NETWORKING APPLICATIONS NS
CONTACT TRACING À LA DP-3T APPLIED CRYPTOGRAPHY IN ACTION AC
CONTRIBUTION OF SIEM TO ANALYSIS AND DETECTION ANALYSE: ANALYSIS METHODS SOIM
CONTROL-FLOW RESTRICTIONS OS HARDENING OSV
COOKIES FUNDAMENTAL CONCEPTS AND APPROACHES WAM
COORDINATED CLUSTERING ACROSS DISTRIBUTED RESOURCES AND SERVICES CLASSES OF DISTRIBUTED SYSTEMS DSS
COORDINATED SPREAD SPECTRUM TECHNIQUES JAMMING AND JAMMING-RESILIENT COMMUNICATIONS PLT
COORDINATION PRINCIPLES COORDINATED RESOURCE CLUSTERING DSS
CORE CONCEPTS ACCESS CONTROL IN DISTRIBUTED SYSTEMS AAA
CORE REGULATORY PRINCIPLES DATA PROTECTION LR
COUNTERMEASURES SIDE CHANNEL ATTACKS AND FAULT ATTACKS HS
COUNTERMEASURES JAMMING AND JAMMING-RESILIENT COMMUNICATIONS PLT
CRIMES AGAINST INFORMATION SYSTEMS COMPUTER CRIME LR
CRIMINAL LAW INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH LR
CROSS-BORDER CRIMINAL INVESTIGATION PUBLIC INTERNATIONAL LAW LR
CROSS-BORDER REGULATIONS OTHER NETWORK SECURITY TOPICS NS
CRYPTOGRAPHIC ALGORITHMS AT RTL LEVEL HARDWARE DESIGN FOR CRYPTOGRAPHIC ALGORITHMS HS
CRYPTOGRAPHIC DIVERSITY ALGORITHMS, SCHEMES AND PROTOCOLS AC
CRYPTOGRAPHIC HASHING CLOUD FORENSICS F
CRYPTOGRAPHIC LIBRARIES CRYPTOGRAPHIC IMPLEMENTATION AC
CRYPTOGRAPHIC LIBRARIES SOFTWARE AND LARGE SCALE SYSTEMS FMS
CRYPTOGRAPHY AND ACCESS CONTROL ACCESS CONTROL IN DISTRIBUTED SYSTEMS AAA
CUSTOMERS DON’T APPLY PATCHES MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE SSL
CVES AND CWES CATEGORIES OF VULNERABILITIES SS
CYBER CONFLICT POLICY AND POLITICAL ASPECTS CPS
CYBER-DEPENDENT ORGANISED CRIME CHARACTERISATION OF ADVERSARIES AB
CYBER DOMAIN DEFINITIONS AND CONCEPTUAL MODELS F
CYBER-ENABLED CRIME VS CYBER-DEPENDENT CRIME CHARACTERISATION OF ADVERSARIES AB
CYBER-ENABLED ORGANISED CRIME CHARACTERISATION OF ADVERSARIES AB
CYBER ESPIONAGE IN PEACETIME PUBLIC INTERNATIONAL LAW LR
CYBER KILL CHAIN MALICIOUS ACTIVITIES BY MALWARE MAT
CYBER SECURITY KNOWLEDGE MANAGEMENT KNOWLEDGE: INTELLIGENCE AND ANALYSIS SOIM
CYBER-THREAT INTELLIGENCE KNOWLEDGE: INTELLIGENCE AND ANALYSIS SOIM
DATA ACQUISITION OPERATING SYSTEM ANALYSIS F
DATABASES RELATED AREAS OSV
DATA COLLECTION PLAN: SECURITY INFORMATION AND EVENT MANAGEMENT SOIM
DATA CONFIDENTIALITY CONFIDENTIALITY POR
DATA RECOVERY AND FILE CONTENT CARVING OPERATING SYSTEM ANALYSIS F
DATA SECURITY CLASSES OF VULNERABILITIES AND THREATS DSS
DATA SOVEREIGNTY JURISDICTION LR
DATA TRANSPORTATION CLASSES OF VULNERABILITIES AND THREATS DSS
DECENTRALISED POINT-TO-POINT INTERACTIONS ACROSS DISTRIBUTED ENTITIES WITHOUT A CENTRALISED COORDINATION SERVICE CLASSES OF DISTRIBUTED SYSTEMS DSS
DEFENCES CRYPTOGRAPHIC IMPLEMENTATION AC
DEFINITION OF CYBER SECURITY FOUNDATIONAL CONCEPTS CI
DEFINITIONS DEFINITIONS AND CONCEPTUAL MODELS F
DELAY TOLERANT NETWORKS AND AD-HOC SENSORS NETWORKS OTHER NETWORK SECURITY TOPICS NS
DE MINIMIS EXCEPTIONS TO CRIMES AGAINST INFORMATION SYSTEMS COMPUTER CRIME LR
DES SCHEMES C
DESIGN AND FABRICATION OF SILICON INTEGRATED CIRCUITS HARDWARE DESIGN PROCESS HS
DESIGN CHOICES ROLE OF OPERATING SYSTEMS OSV
DESIGN PROCESS HARDWARE DESIGN FOR CRYPTOGRAPHIC ALGORITHMS HS
DETECTING ATTACKS CROSS CUTTING SECURITY CPS
DEVELOPMENT OF STANDARDISED CRYPTOGRAPHY ALGORITHMS, SCHEMES AND PROTOCOLS AC
DEVICE CAPABILITIES AND LIMITATIONS FITTING THE TASK TO THE HUMAN HF
DEVICE FINGERPRINTS IDENTIFICATION PLT
DEVICE UNDER IDENTIFICATION IDENTIFICATION PLT
DIFFIE-HELLMAN KEY EXCHANGE ALGORITHMS, SCHEMES AND PROTOCOLS AC
DIGITAL (FORENSIC) TRACE DEFINITIONS AND CONCEPTUAL MODELS F
DIGITAL SIGNATURES ALGORITHMS, SCHEMES AND PROTOCOLS AC
DIMENSIONS MALWARE TAXONOMY MAT
DISRUPTING MALWARE OPERATIONS MALWARE RESPONSE MAT
DISTANCE BOUNDING PROTOCOLS DISTANCE BOUNDING AND SECURE POSITIONING PLT
DISTANCE MEASUREMENT TECHNIQUES DISTANCE BOUNDING AND SECURE POSITIONING PLT
DISTRIBUTED LOGS ACCOUNTABILITY AAA
DOS COUNTERMEASURES NETWORK SECURITY TOOLS NS
DSA SCHEMES C
DYNAMIC DETECTION DETECTION OF VULNERABILITIES SS
ECOMMERCE ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE SSL
EFFECTS OF CONTRACT ON NON-CONTRACTING PARTIES CONTRACT LR
ELECTRIC POWER GRIDS CYBER-PHYSICAL SYSTEMS DOMAINS CPS
ELECTRONIC SIGNATURES AND IDENTITY TRUST SERVICES DEMATERIALISATION OF DOCUMENTS AND ELECTRONIC TRUST SERVICES LR
ELEMENTS OF RISK RISK ASSESSMENT AND MANAGEMENT PRINCIPLES RMG
EMPLOYEES STAKEHOLDER ENGAGEMENT HF
ENACTING SECURITY POLICY RISK GOVERNANCE RMG
ENCOURAGING SECURITY STANDARDS VIA CONTRACT CONTRACT LR
ENFORCEMENT AND PENALTIES DATA PROTECTION LR
ENFORCEMENT JURISDICTION JURISDICTION LR
ENFORCEMENT OF PRIVACY LAWS PRIVACY LAWS IN GENERAL AND ELECTRONIC INTERCEPTION LR
ENFORCEMENT – REMEDIES INTELLECTUAL PROPERTY LR
ENFORCING ACCESS CONTROL AUTHORISATION AAA
ENVIRONMENTAL CRIMINOLOGY MODELS AB
ERRONEOUS EXECUTION PREVENTION OF VULNERABILITIES SS
EVASION AND COUNTERMEASURES MALWARE DETECTION MAT
EVIDENCE AND PROOF INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH LR
FACETS OF AUTHENTICATION AUTHENTICATION AAA
FAILURES AND INCIDENTS FOUNDATIONAL CONCEPTS CI
FEAR UNCERTAINTY AND DOUBT POSITIVE SECURITY HF
FEDERATED ACCESS CONTROL ACCESS CONTROL IN DISTRIBUTED SYSTEMS AAA
FEEDBACK-BASED TRANSPARENCY TRANSPARENCY POR
FILE INFORMATION MAIN MEMORY FORENSICS F
FILESYSTEM ANALYSIS OPERATING SYSTEM ANALYSIS F
FIPS 140-2 MEASURING HARDWARE SECURITY HS
FIREWALLING NETWORK SECURITY TOOLS NS
FLOW OF CAPITAL MODELS AB
FOLLOW UP: POST INCIDENT ACTIVITIES HUMAN FACTORS: INCIDENT MANAGEMENT SOIM
FORENSICS CHALLENGES CLOUD FORENSICS F
FORENSIC SCIENCE DEFINITIONS AND CONCEPTUAL MODELS F
FORMAL VERIFICATION OS HARDENING OSV
FREQUENT SOFTWARE UPDATES FUNDAMENTAL CONCEPTS AND APPROACHES WAM
FRIENDLY JAMMING SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL PLT
FROM SCHEMES TO PROTOCOLS ALGORITHMS, SCHEMES AND PROTOCOLS AC
FULL-STACK VERIFICATION SOFTWARE AND LARGE SCALE SYSTEMS FMS
FULLY DISTRIBUTED NETWORKS: DHTS AND UNSTRUCTURED P2P NETWORKS NETWORKING APPLICATIONS NS
FULLY HOMOMORPHIC ENCRYPTION PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES C
FUNCTIONAL ELEMENTS ATTACKING P2P SYSTEMS DSS
GNSS SECURITY AND SPOOFING ATTACKS PHYSICAL LAYER SECURITY OF SELECTED COMMUNI- PLT
GOALS PRIVACY ENGINEERING POR
GOALS AND TASKS FITTING THE TASK TO THE HUMAN HF
GOVERNANCE MODELS RISK GOVERNANCE RMG
GROUP SIGNATURES PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES C
GRSECURITY EMBRACING SECURITY OSV
HACKTIVISTS CHARACTERISATION OF ADVERSARIES AB
HANDLE: ACTUAL INCIDENT RESPONSE HUMAN FACTORS: INCIDENT MANAGEMENT SOIM
HARD PROBLEMS CRYPTOGRAPHIC SECURITY MODELS C
HARDWARE DESIGN PROCESS HARDWARE DESIGN CYCLE HS
HARDWARE SECURITY MODULE (HSM) SECURE PLATFORMS HS
HARDWARE VERIFICATION HARDWARE FMS
HASH FUNCTIONS ALGORITHMS, SCHEMES AND PROTOCOLS AC
HIERARCHICAL P2P PROTOCOLS DECENTRALISED P2P MODELS DSS
HOLISTIC APPROACHES TO LEGAL RISK ANALYSIS INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH LR
HONEYPOTS AND HONEYNETS KNOWLEDGE: INTELLIGENCE AND ANALYSIS SOIM
HUMAN BIASES FITTING THE TASK TO THE HUMAN HF
HUMAN CAPABILITIES AND LIMITATIONS FITTING THE TASK TO THE HUMAN HF
HUMAN FACTORS AND RISK COMMUNICATION RISK GOVERNANCE RMG
HUMAN SERVICES ELEMENTS OF A MALICIOUS OPERATION AB
HYBRID P2P PROTOCOLS DECENTRALISED P2P MODELS DSS
IBM 4578 SECURE COPROCESSOR HARDWARE SUPPORT FOR SOFTWARE SECURITY HS
IDENTIFICATION SIGNALS IDENTIFICATION PLT
IDENTIFYING THE ANALYSIS ENVIRONMENT MALWARE ANALYSIS MAT
IDENTIFYING THE PRESENCE OF MALWARE MALWARE DETECTION MAT
IDENTITY-BASED ENCRYPTION PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES C
IDENTITY MANAGEMENT AUTHENTICATION AAA
IMPLEMENTATION CHALLENGES CRYPTOGRAPHIC IMPLEMENTATION AC
INADEQUACY OF TRADITIONAL DEVELOPMENT METHODS MOTIVATION FMS
INCENTIVES AND REGULATION POLICY AND POLITICAL ASPECTS CPS
INDUSTRIAL CONTROL SYSTEMS CYBER-PHYSICAL SYSTEMS DOMAINS CPS
INDUSTRY PRACTICES AND STANDARDS POLICY AND POLITICAL ASPECTS CPS
INDUSTRY-SPECIFIC REGULATIONS OTHER REGULATORY MATTERS LR
INFECTION VECTORS ELEMENTS OF A MALICIOUS OPERATION AB
INFORMATION FLOW PREVENTION OF VULNERABILITIES SS
INFORMATION FLOW CONTROL SOFTWARE AND LARGE SCALE SYSTEMS FMS
INFORMATION HARDENING OS HARDENING OSV
INFRASTRUCTURE ELEMENTS OF A MALICIOUS OPERATION AB
INJECTION VULNERABILITIES SERVER-SIDE VULNERABILITIES AND MITIGATIONS WAM
INTERACTION CONTEXT FITTING THE TASK TO THE HUMAN HF
INTERCEPTION BY A STATE PRIVACY LAWS IN GENERAL AND ELECTRONIC INTERCEPTION LR
INTERCEPTION BY PERSONS OTHER THAN STATE PRIVACY LAWS IN GENERAL AND ELECTRONIC INTERCEPTION LR
INTERNATIONAL NORMS PRIVACY LAWS IN GENERAL AND ELECTRONIC INTERCEPTION LR
INTERNATIONAL TREATMENT AND CONFLICT OF LAW INTELLECTUAL PROPERTY LR
INTERPERSONAL CRIMES CHARACTERISATION OF ADVERSARIES AB
INTRUSION DETECTION AND PREVENTION SYSTEMS NETWORK SECURITY TOOLS NS
INTRUSION PREVENTION SYSTEMS EXECUTE: MITIGATION AND COUNTERMEASURES SOIM
INVESTIGATION AND PREVENTION OF CRIME DATA PROTECTION LR
IOT ROLE OF OPERATING SYSTEMS OSV
IOT ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE SSL
IOT CYBER-PHYSICAL SYSTEMS DOMAINS CPS
ISO/IEC 27035 BUSINESS CONTINUITY: INCIDENT RESPONSE AND RECOVERY PLANNING RMG
ISOLATION ROLE OF OPERATING SYSTEMS OSV
KERBEROS SCHEMES C
KEY AGREEMENT PROTOCOLS STANDARD PROTOCOLS C
KEY DERIVATION KEY MANAGEMENT AC
KEY ESTABLISHMENT BASED ON CHANNEL RECIPROCITY SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL PLT
KEY GENERATION KEY MANAGEMENT AC
KEY SIZES ALGORITHMS, SCHEMES AND PROTOCOLS AC
KEY STORAGE KEY MANAGEMENT AC
KEY TRANSPORTATION KEY MANAGEMENT AC
KILL CHAINS MODELS AB
KINDS MALWARE TAXONOMY MAT
LANGUAGE DESIGN AND TYPE SYSTEMS PREVENTION OF VULNERABILITIES SS
LATENT DESIGN CONDITIONS PRINCIPLES CI
LATENT USABILITY FAILURES HUMAN ERROR HF
LEGAL CONCERNS AND THE DAUBERT STANDARD DEFINITIONS AND CONCEPTUAL MODELS F
LEVELS OF PERCEIVED RISK RISK DEFINITIONS RMG
LIABILITY AND COURTS INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH LR
LIGHTWEIGHT SOLUTIONS HARDWARE SUPPORT FOR SOFTWARE SECURITY HS
LIMITATIONS MOTIVATION FMS
LIMITATIONS OF LIABILITY AND EXCLUSIONS OF LIABILITY CONTRACT LR
LIMITING PRIVILEGES MITIGATING EXPLOITATION SS
LINEARLY HOMOMORPHIC ENCRYPTION PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES C
LOCAL AREA NETWORKS (LANS) NETWORKING APPLICATIONS NS
LOGICS AND SPECIFICATION LANGUAGES FOUNDATIONS, METHODS AND TOOLS FMS
LONG-TERM MEMORY FITTING THE TASK TO THE HUMAN HF
LOW-END DEVICES AND IOT PRIMITIVES FOR ISOLATION AND MEDIATION OSV
LOW-LEVEL CODE SOFTWARE AND LARGE SCALE SYSTEMS FMS
LPI AND COVERT COMMUNICATION SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL PLT
MACHINE LEARNING ANALYSE: ANALYSIS METHODS SOIM
MAKING CRYPTOGRAPHY INVISIBLE CONSUMING CRYPTOGRAPHY AC
MANAGING PUBLIC KEYS AND PUBLIC KEY INFRASTRUCTURE KEY MANAGEMENT AC
MATTERS CLASSIFIED AS SECRET BY A STATE OTHER REGULATORY MATTERS LR
MEDIATION ROLE OF OPERATING SYSTEMS OSV
MEDICAL DEVICES CYBER-PHYSICAL SYSTEMS DOMAINS CPS
MEMORY MANAGEMENT VULNERABILITIES CATEGORIES OF VULNERABILITIES SS
MEMORY PROTECTION AND ADDRESS SPACES PRIMITIVES FOR ISOLATION AND MEDIATION OSV
MENTAL MODELS OF CYBER RISKS AND DEFENCES AWARENESS AND EDUCATION HF
MENTAL MODELS OF SECURITY USABLE SECURITY HF
MESSAGE AUTHENTICATION CODE (MAC) SCHEMES ALGORITHMS, SCHEMES AND PROTOCOLS AC
METADATA CONFIDENTIALITY CONFIDENTIALITY POR
MICROSOFT SDL PRESCRIPTIVE PROCESSES SSL
MIMO-SUPPORTED APPROACHES SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL PLT
MISUSE DETECTION ANALYSE: ANALYSIS METHODS SOIM
MITIGATING ATTACKS CROSS CUTTING SECURITY CPS
MOBILE ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE SSL
MODERN HARDWARE EXTENSIONS FOR MEMORY PROTECTION PRIMITIVES FOR ISOLATION AND MEDIATION OSV
MULTICS PRIMITIVES FOR ISOLATION AND MEDIATION OSV
NATURE OF LAW AND LEGAL ANALYSIS INTRODUCTORY PRINCIPLES OF LEGAL RESEARCH LR
NCSC GUIDANCE BUSINESS CONTINUITY: INCIDENT RESPONSE AND RECOVERY PLANNING RMG
NEEDS OF SPECIFIC GROUPS FITTING THE TASK TO THE HUMAN HF
NETWORK ACCESS CONTROL NETWORK SECURITY TOOLS NS
NETWORK AGGREGATES: NETFLOW MONITOR: DATA SOURCES SOIM
NETWORK CONNECTIONS MAIN MEMORY FORENSICS F
NETWORK COVERT CHANNELS OTHER NETWORK SECURITY TOPICS NS
NETWORK INFRASTRUCTURE INFORMATION MONITOR: DATA SOURCES SOIM
NETWORKING INFRASTRUCTURE SECURITY OTHER NETWORK SECURITY TOPICS NS
NETWORK SECURITY MONITORING NETWORK SECURITY TOOLS NS
NETWORK TRAFFIC MONITOR: DATA SOURCES SOIM
NEW APPROACHES AWARENESS AND EDUCATION HF
NEWER PRINCIPLES OS SECURITY PRINCIPLES OSV
NFC PHYSICAL LAYER SECURITY OF SELECTED COMMUNICATIONS TECHNOLOGIES PLT
NIST PRINCIPLES PRINCIPLES CI
OBJECTIVES HARDWARE SUPPORT FOR SOFTWARE SECURITY HS
OBJECTIVES OF CYBER SECURITY FOUNDATIONAL CONCEPTS CI
OBLIGATIONS OWED TO A CLIENT ETHICS LR
OBLIVIOUS TRANSFER ADVANCED PROTOCOLS C
ONE-TIME PAD INFORMATION-THEORETICALLY SECURE CONSTRUCTIONS C
ON-LINE CONTRACTS CONTRACT LR
OPERATING SYSTEMS SOFTWARE AND LARGE SCALE SYSTEMS FMS
ORIGIN-BASED POLICIES ACCESS CONTROL IN DISTRIBUTED SYSTEMS AAA
PARTITIONING OS HARDENING OSV
PASSWORD BASED KEY DERIVATION KEY MANAGEMENT AC
PASSWORDS AND ALTERNATIVES FUNDAMENTAL CONCEPTS AND APPROACHES WAM
PATCHING CAN INTRODUCE VULNERABILITIES MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE SSL
PAX TEAM EMBRACING SECURITY OSV
PAYMENT METHODS ELEMENTS OF A MALICIOUS OPERATION AB
PAYMENT NETWORKS OTHER NETWORK SECURITY TOPICS NS
PEOPLE ARE NOT THE WEAKEST LINK POSITIVE SECURITY HF
PERMISSION DIALOG BASED ACCESS CONTROL FUNDAMENTAL CONCEPTS AND APPROACHES WAM
PERSONAL DATA BREACH NOTIFICATION DATA PROTECTION LR
PHISHING CLIENT-SIDE VULNERABILITIES AND MITIGATIONS WAM
PHYSICAL ACCESS AND SECURE DELETION PRIMITIVES FOR ISOLATION AND MEDIATION OSV
PHYSICAL ATTACKS CLIENT-SIDE VULNERABILITIES AND MITIGATIONS WAM
PHYSICAL LAYER ATTACKS ON SECURE DISTANCE MEASUREMENT DISTANCE BOUNDING AND SECURE POSITIONING PLT
PHYSICAL LAYER SECURITY OTHER NETWORK SECURITY TOPICS NS
PHYSICALLY UNCLONABLE FUNCTIONS (PUFS) ENTROPY GENERATING BUILDING BLOCKS HS
PKCS SCHEMES C
POLICY ANALYSIS CONFIGURATION FMS
POST-QUANTUM CRYPTOGRAPHY ALGORITHMS, SCHEMES AND PROTOCOLS AC
POTENTIALLY UNWANTED PROGRAMS MALWARE TAXONOMY MAT
PRECAUTIONARY PRINCIPLE PRINCIPLES CI
PREPARE: INCIDENT MANAGEMENT PLANNING HUMAN FACTORS: INCIDENT MANAGEMENT SOIM
PRESCRIPTIVE JURISDICTION JURISDICTION LR
PREVENTING ATTACKS CROSS CUTTING SECURITY CPS
PRINCIPLES DECENTRALISED P2P MODELS DSS
PRIVACY AND ACCOUNTABILITY ACCOUNTABILITY AAA
PRIVACY EVALUATION PRIVACY ENGINEERING POR
PRIVACY POLICY INTERPRETABILITY CONTROL POR
PRIVACY POLICY NEGOTIATION CONTROL POR
PRIVACY SETTINGS CONFIGURATION CONTROL POR
PRIVACY TECHNOLOGIES AS SUPPORT TO DEMOCRATIC POLITICAL SYSTEMS PRIVACY TECHNOLOGIES AND DEMOCRATIC VALUES POR
PROCESS INFORMATION MAIN MEMORY FORENSICS F
PROPERTIES OF SYSTEMS AND THEIR EXECUTION FOUNDATIONS, METHODS AND TOOLS FMS
PROPERTY CHECKING FOUNDATIONS, METHODS AND TOOLS FMS
PROTECTED MODULE ARCHITECTURES HARDWARE SUPPORT FOR SOFTWARE SECURITY HS
PROTECTING DATA INTEGRITY SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL PLT
PROTECTION AGAINST NATURAL EVENTS AND ACCIDENTS CYBER-PHYSICAL SYSTEMS CPS
PROTECTION RINGS PRIMITIVES FOR ISOLATION AND MEDIATION OSV
PUBLIC-KEY ENCRYPTION PUBLIC-KEY CRYPTOGRAPHY C
PUBLIC KEY ENCRYPTION SCHEMES AND KEY ENCAPSULATION MECHANISMS ALGORITHMS, SCHEMES AND PROTOCOLS AC
PUBLIC-KEY SIGNATURES PUBLIC-KEY CRYPTOGRAPHY C
QUANTUM KEY DISTRIBUTION ALGORITHMS, SCHEMES AND PROTOCOLS AC
RACE CONDITION MITIGATIONS PREVENTION OF VULNERABILITIES SS
RACE CONDITION VULNERABILITIES CATEGORIES OF VULNERABILITIES SS
RANDOM BIT GENERATION CRYPTOGRAPHIC IMPLEMENTATION AC
RANDOM NUMBER GENERATION ENTROPY GENERATING BUILDING BLOCKS HS
REFRESHING KEYS AND FORWARD SECURITY KEY MANAGEMENT AC
RELIABLE AND SECURE GROUP COMMUNICATIONS COORDINATED RESOURCE CLUSTERING DSS
REPLICATION MANAGEMENT AND COORDINATION SCHEMA COORDINATED RESOURCE CLUSTERING DSS
REQUIREMENTS OF FORM AND THE THREAT OF UNENFORCEABILITY DEMATERIALISATION OF DOCUMENTS AND ELECTRONIC TRUST SERVICES LR
RESEARCH AND DEVELOPMENT ACTIVITIES CONDUCTED BY NON-STATE PERSONS COMPUTER CRIME LR
RESOURCE COORDINATION CLASS COORDINATION CLASSES AND ATTACKABILITY DSS
RESOURCE MANAGEMENT AND COORDINATION SERVICES CLASSES OF VULNERABILITIES AND THREATS DSS
RESTRICTIONS ON EXPORTING SECURITY TECHNOLOGIES OTHER REGULATORY MATTERS LR
REVERSE ENGINEERING INTELLECTUAL PROPERTY LR
RING SIGNATURES PUBLIC-KEY SCHEMES WITH SPECIAL PROPERTIES C
RISK ASSESSMENT RISK DEFINITIONS RMG
RISK ASSESSMENT AND MANAGEMENT IN CYBER-PHYSICAL SYSTEMS RISK ASSESSMENT AND MANAGEMENT PRINCIPLES RMG
RISK ASSESSMENT AND MANAGEMENT METHODS RISK ASSESSMENT AND MANAGEMENT PRINCIPLES RMG
RISK MANAGEMENT FOUNDATIONAL CONCEPTS CI
RISK MANAGEMENT RISK DEFINITIONS RMG
RISK PERCEPTION FACTORS RISK GOVERNANCE RMG
ROAD VEHICLES ADAPTATIONS OF SECURE SOFTWARE LIFECYCLE SSL
ROBOTICS AND ADVANCED MANUFACTURING CYBER-PHYSICAL SYSTEMS DOMAINS CPS
ROOT OF TRUST HARDWARE DESIGN CYCLE HS
RSA SCHEMES C
RUNTIME DETECTION OF ATTACKS MITIGATING EXPLOITATION SS
SAAS FORENSICS CLOUD FORENSICS F
SAFECODE PRESCRIPTIVE PROCESSES SSL
SALTZER AND SCHROEDER PRINCIPLES PRINCIPLES CI
SALTZER AND SCHROEDER’S PRINCIPLES OS SECURITY PRINCIPLES OSV
SAMM ASSESS THE SECURE SOFTWARE LIFECYCLE SSL
SANDBOXING FUNDAMENTAL CONCEPTS AND APPROACHES WAM
SDN AND NFV SECURITY NETWORK SECURITY TOOLS NS
SECRECY CAPACITY SCHEMES FOR CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL PLT
SECRET SHARING INFORMATION-THEORETICALLY SECURE CONSTRUCTIONS C
SECURE ELEMENT AND SMARTCARD SECURE PLATFORMS HS
SECURE MESSAGING APPLIED CRYPTOGRAPHY IN ACTION AC
SECURE MULTI-PARTY COMPUTATION ADVANCED PROTOCOLS C
SECURE POSITIONING DISTANCE BOUNDING AND SECURE POSITIONING PLT
SECURITY AND PRIVACY CONCERNS CYBER-PHYSICAL SYSTEMS CPS
SECURITY ARCHITECTURE AND LIFECYCLE CROSS-CUTTING THEMES CI
SECURITY AT THE APPLICATION LAYER NETWORK PROTOCOLS AND THEIR SECURITY NS
SECURITY AT THE INTERNET LAYER NETWORK PROTOCOLS AND THEIR SECURITY NS
SECURITY AT THE TRANSPORT LAYER NETWORK PROTOCOLS AND THEIR SECURITY NS
SECURITY CULTURE RISK GOVERNANCE RMG
SECURITY DOMAINS ROLE OF OPERATING SYSTEMS OSV
SECURITY ECONOMICS CROSS-CUTTING THEMES CI
SECURITY GOALS IN NETWORKED SYSTEMS SECURITY GOALS AND ATTACKER MODELS NS
SECURITY HYGIENE HUMAN ERROR HF
SECURITY METRICS RISK ASSESSMENT AND MANAGEMENT PRINCIPLES RMG
SECURITY MODELS OS SECURITY PRINCIPLES OSV
SECURITY ON LINK LAYER NETWORK PROTOCOLS AND THEIR SECURITY NS
SECURITY OPERATIONS AND BENCHMARKING PLAN: SECURITY INFORMATION AND EVENT MANAGEMENT SOIM
SELF-HELP DISFAVOURED: SOFTWARE LOCKS AND HACK-BACK COMPUTER CRIME LR
SENSOR COMPROMISE COMPROMISING EMANATIONS AND SENSOR SPOOFING PLT
SERVER-SIDE MISCONFIGURATION AND VULNERABLE COMPONENTS SERVER-SIDE VULNERABILITIES AND MITIGATIONS WAM
SERVICES CLOUD FORENSICS F
SERVICES COORDINATION CLASS COORDINATION CLASSES AND ATTACKABILITY DSS
SESIP MEASURING HARDWARE SECURITY HS
SETUP ASSUMPTIONS CRYPTOGRAPHIC SECURITY MODELS C
SHADOW SECURITY HUMAN ERROR HF
SHIELDS FROM LIABILITY INTERNET INTERMEDIARIES LR
SHORT-TERM MEMORY FITTING THE TASK TO THE HUMAN HF
SIDE CHANNELS HARDWARE FMS
SIDE CHANNEL VULNERABILITIES CATEGORIES OF VULNERABILITIES SS
SIEM PLATFORMS AND COUNTERMEASURES EXECUTE: MITIGATION AND COUNTERMEASURES SOIM
SIGMA PROTOCOLS ADVANCED PROTOCOLS C
SIGNAL ANNIHILATION AND OVERSHADOWING JAMMING AND JAMMING-RESILIENT COMMUNICATIONS PLT
SIMULATION OF CRYPTOGRAPHIC OPERATIONS CRYPTOGRAPHIC SECURITY MODELS C
SITE RELIABILITY ENGINEERING EXECUTE: MITIGATION AND COUNTERMEASURES SOIM
SITUATIONAL AWARENESS KNOWLEDGE: INTELLIGENCE AND ANALYSIS SOIM
SOAR: IMPACT AND RISK ASSESSMENT EXECUTE: MITIGATION AND COUNTERMEASURES SOIM
SOFTWARE-DEFINED NETWORKING AND NETWORK FUNCTION VIRTUALISATION NETWORKING APPLICATIONS NS
SOFTWARE DEVELOPERS STAKEHOLDER ENGAGEMENT HF
SOUNDNESS DETECTION OF VULNERABILITIES SS
SPECIALISED SERVICES ELEMENTS OF A MALICIOUS OPERATION AB
SPECIFICATION-BASED SYNTHESIS CONFIGURATION FMS
STATE ACTORS CHARACTERISATION OF ADVERSARIES AB
STATE CYBER OPERATIONS IN GENERAL PUBLIC INTERNATIONAL LAW LR
STATIC DETECTION DETECTION OF VULNERABILITIES SS
STOCHASTIC METHODS CRYPTOGRAPHIC PROTOCOLS FMS
STORAGE FORENSICS OPERATING SYSTEM ANALYSIS F
STRATEGIES PRIVACY ENGINEERING POR
STREAM CIPHERS ALGORITHMS, SCHEMES AND PROTOCOLS AC
STRUCTURED OUTPUT GENERATIONS MITIGATIONS PREVENTION OF VULNERABILITIES SS
STRUCTURED OUTPUT GENERATIONS VULNERABILITIES CATEGORIES OF VULNERABILITIES SS
STRUCTURED P2P PROTOCOLS DECENTRALISED P2P MODELS DSS
SUBJECT MATTER AND REGULATORY FOCUS DATA PROTECTION LR
SYMBOLIC METHODS CRYPTOGRAPHIC PROTOCOLS FMS
SYMMETRIC ENCRYPTION AND AUTHENTICATION SYMMETRIC CRYPTOGRAPHY C
SYMMETRIC PRIMITIVES SYMMETRIC CRYPTOGRAPHY C
SYSLOG MONITOR: DATA SOURCES SOIM
SYSTEM AND KERNEL LOGS MONITOR: DATA SOURCES SOIM
SYSTEMS COORDINATION STYLES COORDINATED RESOURCE CLUSTERING DSS
TAKE-DOWN PROTECTION INTERNET INTERMEDIARIES LR
TECHNICAL ASPECTS ACCOUNTABILITY AAA
TERMS AWARENESS AND EDUCATION HF
TESTING AND VALIDATING INTRUSION DETECTION SYSTEMS ANALYSE: ANALYSIS METHODS SOIM
THE ADVERSARY ALGORITHMS, SCHEMES AND PROTOCOLS AC
THE BASE-RATE FALLACY ANALYSE: ANALYSIS METHODS SOIM
THE CHALLENGES OF CONSUMING CRYPTOGRAPHY CONSUMING CRYPTOGRAPHY AC
THE ENFORCEMENT OF, AND PENALTIES FOR, CRIMES AGAINST INFORMATION SYSTEMS COMPUTER CRIME LR
THE KEY LIFECYCLE KEY MANAGEMENT AC
THE LAW OF ARMED CONFLICT PUBLIC INTERNATIONAL LAW LR
THEORY AUTHORISATION AAA
THE ROLE OF FORMAL SECURITY DEFINITIONS AND PROOFS ALGORITHMS, SCHEMES AND PROTOCOLS AC
THINKING FAST AND SLOW HUMAN ERROR HF
THREAT MODEL HARDWARE DESIGN CYCLE HS
THREATS TO SECURITY FOR MODERN OSS ATTACKER MODEL OSV
TIME HARDWARE DESIGN PROCESS HS
TLS SCHEMES C
TOUCHPOINTS PRESCRIPTIVE PROCESSES SSL
TOWARDS MORE SCIENTIFIC DEVELOPMENT METHODS MOTIVATION FMS
TRANSPORTATION SYSTEMS AND AUTONOMOUS VEHICLES CYBER-PHYSICAL SYSTEMS DOMAINS CPS
TRANSPORT LAYER SECURITY APPLIED CRYPTOGRAPHY IN ACTION AC
TROJAN CIRCUITS HARDWARE DESIGN PROCESS HS
TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA PRIMITIVES FOR ISOLATION AND MEDIATION OSV
TRUSTED COMPUTING MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE SSL
TRUSTED EXECUTION ENVIRONMENT HARDWARE SUPPORT FOR SOFTWARE SECURITY HS
TRUSTED PLATFORM MODULE (TPM) SECURE PLATFORMS HS
UNCOORDINATED SPREAD SPECTRUM TECHNIQUES JAMMING AND JAMMING-RESILIENT COMMUNICATIONS PLT
UNDERGROUND ECO-SYSTEM MALICIOUS ACTIVITIES BY MALWARE MAT
UNDERSTANDING INTELLECTUAL PROPERTY INTELLECTUAL PROPERTY LR
UNIVERSAL COMPOSABILITY CRYPTOGRAPHIC SECURITY MODELS C
UNSTRUCTURED P2P PROTOCOLS DECENTRALISED P2P MODELS DSS
USER AUTHENTICATION AUTHENTICATION AAA
VERIFICATION AND FORMAL METHODS CROSS-CUTTING THEMES CI
VIRTUAL MACHINES ROLE OF OPERATING SYSTEMS OSV
VIRTUAL MACHINES HARDWARE SUPPORT FOR SOFTWARE SECURITY HS
VULNERABILITIES CAN BE EXPLOITED WITHOUT BEING NOTICED MOTIVATIONS FOR SECURE SOFTWARE LIFECYCLE SSL
VULNERABILITY MANAGEMENT RISK ASSESSMENT AND MANAGEMENT PRINCIPLES RMG
VULNERABILITY TESTING ETHICS LR
WARRANTED STATE ACTIVITY COMPUTER CRIME LR
WARRANTIES AND THEIR EXCLUSION CONTRACT LR
WEB-BASED APPLICATIONS SOFTWARE AND LARGE SCALE SYSTEMS FMS
WEBIFICATION FUNDAMENTAL CONCEPTS AND APPROACHES WAM
WEB PKI AND HTTPS FUNDAMENTAL CONCEPTS AND APPROACHES WAM
WIRELESS NETWORKS NETWORKING APPLICATIONS NS
WORKFLOWS AND VOCABULARY FUNDAMENTAL CONCEPTS SOIM
ZERO KNOWLEDGE ADVANCED PROTOCOLS C
ZERO TRUST NETWORKING NETWORK SECURITY TOOLS NS

CyBOK © Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence: https://www.nationalarchives.gov.uk/doc/open-government-licence/.