Skip to content

Latest commit

 

History

History
97 lines (53 loc) · 2.38 KB

README-dep.md

File metadata and controls

97 lines (53 loc) · 2.38 KB

Contents

An Introduction to Cybersecurity

Basic Networking

Network Security

Cryptography in a Nutshell

Cryptography and Cyber Security

The Web

Web Security

Disclosing Vulnerabilities

Analyzing Vulnerabilities

Malware

Coming soon

TODO: steganography, reverse engineering, control flow tracing

Coming soon

TODO: integrated circuits, memory dumping, hardware config

Coming soon

TODO: OSINT, Threat modeling, APTs

Coming soon

Coming Soon

TODO: Definitions, hybrid interference, research

Hard Problems in Cyber Security and Tech

  • Cyber Attribution
  • Vulnerability Disclosures
  • Privacy and Data Collection
  • Crypto Wars
  • Developer Accountability (Patching)
  • Weak Passwords
  • Defending Against Cyber Attacks (e.g. DDoS, SQLi)
  • Writing Secure Software
  • Writing Accessible Software
  • Sexual Harassment
  • Lack of Diversity
  • Policymaking (Public and Private)
  • Lack of Education / Emphasis on Responsible Development
  • Esoteric Field
  • Information Warfare and Misinformation
  • Weaponization of software and of information
  • Jurisdiction

Please Read: The ACM's Code of Ethics


The Cyber Kill Chain (Source) The Cyber Kill Chain