# Cybersecurity Canonical URL: https://shipslides.com/d/technology-cybersecurity Raw HTML URL: https://content.shipslides.com/d/technology-cybersecurity/raw Category: Technology Slides: 15 Updated: 2026-05-15T22:19:32.536Z Tags: technology, cybersecurity ## Summary A field that began with one student running a worm at MIT in 1988, and turned into the connective tissue of every other industry. Sixteen pages of attackers, defenders, and the tooling between them. Key sections include: CYBER SECURITY.; 1988-11-02 — the Morris Worm; The CIA triad & threat models; Threat actor classes; The zero-day economy; Web vulnerability classics; Ransomware as a service; Zero Trust; Supply-chain attacks; Crypto primitives. ## Slide Outline 1. CYBER SECURITY. 2. 1988-11-02 — the Morris Worm 3. The CIA triad & threat models 4. Threat actor classes 5. The zero-day economy 6. Web vulnerability classics 7. Ransomware as a service 8. Zero Trust 9. Supply-chain attacks 10. Crypto primitives 11. Defensive stack 12. Incident response (NIST SP 800-61) 13. WATCH _ 14. Glossary 15. Open problems ## Related Decks - [AI & Machine Learning](https://shipslides.com/d/technology-ai-and-ml) - [Biotech](https://shipslides.com/d/technology-biotech) - [Blockchain](https://shipslides.com/d/technology-blockchain) - [Compilers](https://shipslides.com/d/technology-compilers)