Get full access to Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time and 60K+ other titles, with free 10-day trial of O'Reilly.
There's also live online events, interactive content, certification prep materials, and more.
History of cybersecurity technologies and attacks
Anatomy of a top-down attack design
Physiology of a bottom-up attack execution example
Attack description: Code Red Worm
Determining the nature of a network-based cyberattack
Defense description: Firewalls
The cybersecurity solution landscape and interrelationships
The cybersecurity-functionality-performance trade-off
Attack description: secrecy attack
Attack description: distributed denial of service
Levels of data criticality
Attack description: buffer overflow
U.S. classification hierarchy in which a person cleared at a given level can see data at that level and lower.
Attack description: social ...
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.