About this deck
A field that began with one student running a worm at MIT in 1988, and turned into the connective tissue of every other industry. Sixteen pages of attackers, defenders, and the tooling between them. Key sections include: CYBER SECURITY.; 1988-11-02 — the Morris Worm; The CIA triad & threat models; Threat actor classes; The zero-day economy; Web vulnerability classics; Ransomware as a service; Zero Trust; Supply-chain attacks; Crypto primitives.
technologycybersecurity