Knowledge Trees - Topics-List v1
Knowledge Trees - Topics-List v1
Foundational Concepts
Objectives of Cyber Security
Mitigate Against Failures and Incidents
Risk Management
Risk Management
The Presence of Vulnerabilities
Nature of Threat
Effectiveness of Security Processes
Principles
Saltzer and Schroeder Principles
Fail-safe Defaults
Complete Mediation
Open Design
Separation of Privilege
Least Privilege
Least Common Mechanism
Work Factor
Compromise Recording
Economy of Mechanism
NIST Principles
Clear Abstraction
Modularity and Layering
Partially Ordered
Secure Evolvability
Crosscutting Themes
Security Economics
Attacker Economics
Microeconomic Theory
Economics of Deviant Security
Forensics
definitions and conceptual models
forensic science
cyber domain
digital (forensic) trace
legal concerns and the Daubert Standard
computer misuse act
cyber crime
standards for the presentation of scientific evidence in legal proceedings
ACPO good practice guide for digital evidence
BS EN ISO/IEC 17020:2012
BS EN ISO/IEC 17025:2005
definitions
digital forensics
DFRWS
NIST
Working
relevence
conceptual models
state-centric
history-centric
cognitive task model
differential analysis
external data sources
schema
sense-making loop
bottom-up processes
search and filter
read and extract
schematize
build case
tell story
top-down processes
re-evaluate
search for suport
search for evidence
search for relations
search for information
the foraging loop
explore
enrich
exploit
the sense making loop
operating system analysis
storage forensics
data abstraction layers
physical media
block device
file system
application artifacts
benefits of independent forensic reconstruction
data acquisition
physical data acquisition
mobile,phone data acquisition
chip-off techniques
RAID data recovery
logical data acquisition
approaches to API based recovery
block-level acquisition
cryptographic hashes
encryption concerns
technical challenges
legal challenges
filesystem analysis
blocks
files
file systems
block device analysis
partitions
logical volumes
data recovery & file content carving
carving techniques
fragmentation
slack space
main memory forensics
process information
file information
network connections
artifacts and fragments
challenges of live forensics
application forensics
web browsers
URL history
form data
temporary files
downloaded files
HTML5 local storage
cookies
cloud forensics
services
SaaS
PaaS
IaaS
forensic challenges
SaaS forensics
partial replication
revision acquisition
cloud-native artifacts
artifact analysis
cryptographic hashing
block-level analysis
approximate analysis
bytewise matching
syntactic matching
semantic matching
bytewise approximate matching
cload-native artifacts
Infrastructure Security
Cyber-physical Systems Security
cyber-physical systems
characteristics
embedded systems
real-time systems
network protocols
wireless
sensor networks
control
discrete-time control
networked-controlled systems
hybrid systems
protections against natural events and accidents
safety
protection
protection of generators
under frequency load shedding (UFLS)
overcurrent protection
ove/under voltage
reliability
fault tolerance
robust control
safety vs security
security and privacy concerns
attacks agains CPSs
architectural threats
high-profile real-world attacks
crosscutting security
preventing attacks
securing legacy systems
bumb-in-the-wire
wireless shield
lightweight security
secure microkernels
preventing transduction attacks
detecting attacks
remote attestation
network intrusion detection
physics-based attack detection
historical anomalies
physical-law anomalies
out-of-band detection
active detection
mitigating attacks
resilient control systems
conservative control
resilient estimation
sensor fusion
virtual sensors
constraining actuation
inertial resets
reactive control compensation
safe control actions
CPS domains
industrial control systems
PLCs
RTUs
corporate networks
SCADA
regulatory control
OT networks
intrusion detection
electric power grids
bulk power system
smart grids
efficiency
reliability
consumer choice
load-altering attacks
transportation systems and autonomous vehicles
traffic flow control
demand management
incident management
vulnerabilities
ground, air, and see vehicles
privacy concerns of drones
transduction attacks on sensors
robotics and advanced manufacturing
attacks on quality
safety problems
medical devices
implantable medical devices
attacks
touch-to-access principle
IoT
DDoS attacks
botnets
privacy invasions
attacks on digital assistants
security hubs
policy and political aspects
incentives and regulation
regulation
incentives
cyber-conflict
cybercriminals
disgruntled employees
terrorists and activists
nation states
Tallinn manual
Koh speech
acts of war
industry practices and standards
ISA 99/IEC 62443
NIST SP 800-53
NIST-IR 762
NERC standards
IEC 104
PROFINET
IEC 62351
ETSI TS 103 645
Hardware Security
hardware design cycle
hardware design process
behavioural domain
current, voltage
logic
register transfers
algorithms
systems
structural domain
transistors
gates, flip-flops, etc
ALUs, RAM, etc
processor
physical domain
transistor layout
cell layout
module layout
floorplans
physical partitions
root of trust
TPMs
SIMs
threat model
measuring hardware security
FIPS 140-2
approved cryptographic algorithms
tamper evidence
tamper resistance
common criteria and EMVCo
SESIP
secure platforms
hardware security module (HSM)
secure element and smartcard
trusted platform module (TPM)
root of trust for measurement
root of trust for storage
root of trust for reporting
hardware support for software security
objectives
protection
isolation
attestation
sealed storage
memory protection
control flow integrity
information flow analysis
virtual machines
trusted execution environment
IBM 4758 secure coprocessor
ARM Trustzone
protected module architectures
small TCB implementations
zero TCB implementations
Intel Software Guard Extension (SGX)
light-weight solutions
SMART
hardware shadow stacks
pointer authentication
Qarma
hardware design for cryptographic algorithms
design process
register transfer level (RTL)
application specific integrated circuit (ASIC)
field programmable gata array (FPGA)
power consumption
electronic design automation (EDA)
cryptographic algorithms at RTL level
secret key algorithms
secret key light-weight algorithms
hash algorithms
cryptocurrency mining
public key algorithms
quantum resistant algorithms
homomorphic encryption schemes
side-channel attacks and fault attacks
attacks
passive side channel attacks
simple power analysis
differential power analysis
electro-magnetic radiation attacks
timing attacks
constant time execution
template attacks
micro-architectural side-channels
spectre
meltdown
foreshadow
active fault attacks
RowHammer
optical-fault attacks
sensors
countermeasures
randomisation
masking
hiding
micro-code updates
redundancy
entropy generating building blocks
random number generation
pseudo random number generation (PRNG)
true random number generation (TRNG)
physically unclonable functions (PUFs)
weak PUFs
strong PUFs
machine learning attacks
hardware design process
design and fabrication of silicon integrated circuits
trojan circuits
cicuit level techniques
board level security
time
Network Security
internet architecture
application-layer security
application-layer protocols
public key infrastructure
certificate authorities
DNSSEC
HTTPS
NTP
DNS security extensions
DNS attacks
DNS hijacking
DNS spoofing
transport-layer security
handshaking
key-derivation
data-transfer
TLS attacks
SYN flooding
SSL stripping
BEAST
lucky thirteen
QUIC
network layer security
IPsec
encapsulation security payload
authentication headers
security association
internet key exchange protocol
IP masquerading
routing protocol security
border gateway protocol
BGP route hijacking
BGP denial-of-service
BGPSec
link layer security
attacks on ethernet switches
MAC spoofing
ARP spoofing
VLAN hopping
switch poisoning attack
IEEE 802.1X
extensible authentication protocol
network defence tools
packet filters
intrusion detection systems
signature-based IDS
anomaly-based IDS
host intrusion detection system
intrusion prevention system
network architecture design
network perimeter protection
application gateway
circuit-level gateway
wireless LAN security
WPA
WPA2
WEP
WPA3
RSN
advanced network security topics
software defined networking
DDOS defences
timing side-channels
network function virtualisation
internet of things security
Mirai malware
limited capacity security protocols
network protocols and vulnerability
Dolev-Yao adversarial model
common network attacks
packet sniffing
man-in-the-middle
denial of service
IP spoofing
Systems Security
Authentication, Authorisation & Accountability
authorisation
access control
core concepts
principal
subject
object
identity based access control
attribute based access control
access rights
security policies
access control matrix
access control list
discretionary access controls (DAC)
mandatory access controls (MAC)
lattices
SELinux
multi-level security policies
role-based access control (RBAC)
flat RBAC
hierarchical RBAC
constrained RBAC
symmetric RBAC
attribute-based access control (ABAC)
code-based access cotrol
Java security model
.NET architecture
mobile security
permissions
digital rights management (DRM)
tamper resistance
attestation
superdistribution
FIDO UAF
usage control
XACML 3.0
enforcing access control
points
policy administration points
policy decision points
policy information points
policy enforcement points
delegation and revocation
online certificate status protocol (OCSP)
reference monitor
trusted computing base (TCB)
authorisation
decision algorithms
rule combining algorithms
execution monitors
in-line reference monitors
theory
Bell-LaPadula (BLP)
*-property
polyinstantiation
Biba
Clark-Wilson
Harrison, Ruzo and Ullman model
enforceable policies
access control logics
access control in distributed systems
core concepts
certificate
credential
token
origin-based policies
sender policy framework (SPF)
cross-site scripting
cross-site resource sharing
federated access control
cryptography and access control
attribute-based encryption
key-policy attribute-based encryption
ciphertext-policy attribute-based encryption
key-centric access control
SPKI/SDSI
constrained delegation
authentication
identity management
privacy by design
user authentication
risk-based authentication
passwords
recommendations
biometrics
liveness detection
verification
failure to capture
false rejects
false accepts
spoofing
border control gates
authentication tokens
behavioural authentication
two-factor authentication (2FA)
authentication in distributed systems
Needhame-Schroeder Protocol
Kerberos
ticket granting server
SAML
OAuth 2
facets of authentication
patterns for entity authentication
correspondence properties
aliveness
weak agreement
non-injective agreement
agreement
authentication vs verified association
authentication for credit or responsibility
accountability
technical aspects
audit policies
preserving the evidence
tamper resistance
write-once, read-many
hash-chain
audit policies
analysing the evidence
assessing the evidence
privacy and accountability
certificate transparency
private subdomains
distributed logs
consensus
blockchains
Cryptography
schemes
AES
RSA
DES
PKCS
DSA
Kerberos
TLS
symmetric cryptography
symmetric primitives
block ciphers
Feistel networks
stream ciphers
hash functions
Merkel-DamgaÌŠrd construction
sponge constructions
symmetric encryption and authentication
modes of operation
ECB
CBC
OFB
CFB
CTR
AEAD
message authentication codes
extendable output function
key derivation functions
public key cryptography
public key encryption
key encapsulation mechanisms
constructions based on RSA
RSA-OAEP
RSA-KEM
data encryption mechanisms
constructions based on elliptic curves
ECIES
lattice-based constructions
public key signatures
full domain hash
probabilistic signature schemes
Schnorr signatures
cryptographic security models
basic security definitions
security games
random oracle model
one-way
passive attack
indistinguishability
chosen plaintext attacks
chosen ciphertext attack
universal forgery
chosen message attack
hard problems
pseudo-random functions
pseudo-random permutations
discrete logarithm problem
Diffie-Hellman problem
shortest vector problem
post-quantum cryptography
closest vector problem
setup assumptions
PKI
common reference strings
good random number generation
simulation of cryptographic operations
universal composability
information-theoretically secure constructions
one-time pad
secret sharing
standard protocols
authentication protocols
encryption-based protocols
message authentication-based protocols
zero-knowledge-based protocols
key agreement protocols
key confirmation
forward secrecy
unknown key share security
key transport
Diffie-Hellman key agreement
station-to-station protocol
advanced protocols
oblivious transfer
zero-knowledge
Σ-protocols
secure multi-party computation
public-key schemes with special properties
group signatures
ring signatures
blind signatures
identity-based encryption
linearly homomorphic encryption
fully homomorphic encryption
Real-world examples
seL4
FREAK SSL/TLS vulnerability
Other real-world examples