shipslides
Tech15 slides0 views

Cybersecurity

A field that began with one student running a worm at MIT in 1988, and turned into the connective tissue of every other industry. Sixteen pages of...

Standalone
Sandboxed deck
Open raw

About this deck

A field that began with one student running a worm at MIT in 1988, and turned into the connective tissue of every other industry. Sixteen pages of attackers, defenders, and the tooling between them. Key sections include: CYBER SECURITY.; 1988-11-02 — the Morris Worm; The CIA triad & threat models; Threat actor classes; The zero-day economy; Web vulnerability classics; Ransomware as a service; Zero Trust; Supply-chain attacks; Crypto primitives.

technologycybersecurity
Slide outline
  1. 01CYBER SECURITY.
  2. 021988-11-02 — the Morris Worm
  3. 03The CIA triad & threat models
  4. 04Threat actor classes
  5. 05The zero-day economy
  6. 06Web vulnerability classics
  7. 07Ransomware as a service
  8. 08Zero Trust
  9. 09Supply-chain attacks
  10. 10Crypto primitives
  11. 11Defensive stack
  12. 12Incident response (NIST SP 800-61)
  13. 13WATCH _
  14. 14Glossary
  15. 15Open problems
Page data
Canonical
https://shipslides.com/d/technology-cybersecurity
Category
Technology
Size
349.3 KB
Updated
2026-05-15
LLM text
https://shipslides.com/d/technology-cybersecurity/llms.txt
Remove this deck