Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
History of cybersecurity technologies and attacks
Anatomy of a top-down attack design
Physiology of a bottom-up attack execution example
Attack description: Code Red Worm
Determining the nature of a network-based cyberattack
Defense description: Firewalls
The cybersecurity solution landscape and interrelationships
The cybersecurity-functionality-performance trade-off
Attack description: secrecy attack
Attack description: distributed denial of service
Levels of data criticality
Attack description: buffer overflow
U.S. classification hierarchy in which a person cleared at a given level can see data at that level and lower.
Attack description: social ...