diff --git a/README-CyBOK-Lecture-Videos.md b/README-CyBOK-Lecture-Videos.md index 68580af2a..e30f5a5c6 100644 --- a/README-CyBOK-Lecture-Videos.md +++ b/README-CyBOK-Lecture-Videos.md @@ -6,7 +6,7 @@ This file is an autogenerated index of the lecture videos referenced by scenario There are 71 videos with CyBOK metadata. -> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. +> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. # Lecture Videos @@ -21,7 +21,7 @@ There are 71 videos with CyBOK metadata. https://www.youtube.com/watch?v=sv1pHuuoW9g - + | KA | Topics | Keywords | | --- | --- | --- | | (IC) | Foundational Concepts | objectives of cyber security | @@ -37,7 +37,7 @@ There are 71 videos with CyBOK metadata. https://www.youtube.com/watch?v=grISRv-CuHE - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Protecting integrity | @@ -54,7 +54,7 @@ There are 71 videos with CyBOK metadata. https://www.youtube.com/watch?v=qzyEdeQ_7ZY - + | KA | Topics | Keywords | | --- | --- | --- | | Forensics (F) | Artifact Analysis | cryptographic hashing | @@ -72,7 +72,7 @@ There are 71 videos with CyBOK metadata. https://www.youtube.com/watch?v=kz7m-iyzSOw - + | KA | Topics | Keywords | | --- | --- | --- | | Operating Systems & Virtualisation (OSV) | Fundamental Concepts | workflows and vocabulary; architectural principles | @@ -90,7 +90,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/lak1Sued4GY - + | KA | Topics | Keywords | | --- | --- | --- | | Operating Systems & Virtualisation (OSV) | Human Factors: Incident Management | prepare: incident management planning; BUSINESS CONTINUITY PLAN - AND INCIDENT RESPONSE | @@ -106,7 +106,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/stVomGROfbQ - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident | @@ -123,7 +123,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/n8IKEJUOISY - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL | @@ -140,7 +140,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/raR0HstMnjg - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | DATA REDUNDANCY; REDUNDANCY IN NETWORK SERVICES | @@ -159,7 +159,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/3oDVTSFhl8Y - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | DATA REDUNDANCY | @@ -175,7 +175,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/M6MisvbU32M - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic | @@ -195,7 +195,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/ZUMBsMppsLo - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Analyse: Analysis Methods | the base-rate fallacy | @@ -214,7 +214,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/nuUm4NO_S1s - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic | @@ -234,7 +234,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/4zYn4hbwKYQ - + | KA | Topics | Keywords | | --- | --- | --- | | (N/A) | Hints | Technical hint | @@ -250,7 +250,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/Y32tmFrCEBk - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic | @@ -269,7 +269,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/aNvVtF437LI - + | KA | Topics | Keywords | | --- | --- | --- | | Forensics (F) | Main Memory Forensics | process information; file information; network connections; artifacts and fragments; challenges of live forensics | @@ -288,7 +288,7 @@ There are 71 videos with CyBOK metadata. https://www.youtube.com/watch?v=iUInvMrBw3k - + | KA | Topics | Keywords | | --- | --- | --- | | Forensics (F) | Main Memory Forensics | process information; file information; network connections; artifacts and fragments; challenges of live forensics | @@ -307,7 +307,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/9nyvtJRQ17w - + | KA | Topics | Keywords | | --- | --- | --- | | Forensics (F) | Main Memory Forensics | process information; file information; network connections | @@ -323,7 +323,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/3kiV0ZJWmMY - + | KA | Topics | Keywords | | --- | --- | --- | | Forensics (F) | Operating System Analysis | storage forensics; data recovery and file content carving; Timeline analysis | @@ -341,7 +341,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/0EafG4CLwA4 - + | KA | Topics | Keywords | | --- | --- | --- | | Security Operations & Incident Management (SOIM) | Monitor: Data Sources | system and kernel logs; application logs: web server logs and files; Syslog | @@ -358,7 +358,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/14Hv_QodLxs - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS | @@ -374,7 +374,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/quKsZbpvYIY - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS | @@ -390,7 +390,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/CxZx7b3OPsg - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Taxonomy | potentially unwanted programs | @@ -407,7 +407,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/3qmmqfBtJio - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Taxonomy | dimensions; kinds; potentially unwanted programs | @@ -423,7 +423,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/k3NwrFWuhaY - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Detection | ANTI-MALWARE - SYSTEMS; ANTIVIRUS SOFTWARE; MALCODE/MALWARE - COUNTERMEASURES - CODE SIGNING; MALCODE/MALWARE - COUNTERMEASURES - SANDBOXING; MALCODE/MALWARE - THIRD-PARTY CERTIFICATIONS | @@ -439,7 +439,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/chebVVwj1kM - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: C | @@ -455,7 +455,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/2R4QzDAfzLQ - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: C | @@ -471,7 +471,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/QbyorEb3WTs - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: ASM; Technical underpinnings for malware analysis: C | @@ -487,7 +487,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/8b6JokfEFEo - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques | @@ -503,7 +503,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/0zUmUZoEpC4 - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS | @@ -519,7 +519,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/m73pHO_0vhI - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS | @@ -535,7 +535,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/6MeJIr3EKKM - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS | @@ -551,7 +551,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/pExTbDVt0Gw - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS | @@ -567,7 +567,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/6XMrHyAqD-4 - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE | @@ -583,7 +583,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/KJPeZptzl1U - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE | @@ -599,7 +599,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/6qeDnjOaRiI - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE | @@ -615,7 +615,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/jo_07iOplzA - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION | @@ -631,7 +631,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/1Hy_166CwRk - + | KA | Topics | Keywords | | --- | --- | --- | | Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION | @@ -647,7 +647,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/nVpqjsfii6c - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Categories of Vulnerabilities | structured output generation vulnerabilities | @@ -664,7 +664,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/PH73lpG2B1M - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Categories of Vulnerabilities | race condition vulnerabilities | @@ -681,7 +681,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/Du3fVc_ZLiI - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Categories of Vulnerabilities | Format string attacks | @@ -697,7 +697,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/nwxtlR31hvw - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Detection of Vulnerabilities | dynamic detection | @@ -713,7 +713,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/vT2PP7VnSNw - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Detection of Vulnerabilities | dynamic detection | @@ -729,7 +729,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/Zh7IdmnCfy0 - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities | @@ -745,7 +745,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/WU06L-u0t2Q - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities | @@ -761,7 +761,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/j2S-XgY-Fyg - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities | @@ -777,7 +777,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/Lf1UPaqPJMM - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Technical Underpinning | Technical underpinnings for memory management vulnerabilities: the stack | @@ -793,7 +793,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/5OUQ7ExlgKI - + | KA | Topics | Keywords | | --- | --- | --- | | Software Security (SS) | Technical Underpinning | Technical underpinnings for memory management vulnerabilities: the stack | @@ -809,7 +809,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/oi_CfBe_umU - + | KA | Topics | Keywords | | --- | --- | --- | | (SSL) | Prescriptive Processes | Microsoft SDL | @@ -826,7 +826,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/Wry2get_RRc - + | KA | Topics | Keywords | | --- | --- | --- | | (SSL) | Prescriptive Processes | Microsoft SDL | @@ -843,7 +843,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/ywLXfSR5YWk - + | KA | Topics | Keywords | | --- | --- | --- | | Operating Systems & Virtualisation (OSV) | OS Security Principles | Saltzer and Schroeder’s principles; newer principles | @@ -859,7 +859,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/v2rChKDAmFg - + | KA | Topics | Keywords | | --- | --- | --- | | (SSL) | Motivations for Secure Software Lifecycle | vulnerabilities can be exploited without being noticed | @@ -876,7 +876,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/xwsBaNQZozg - + | KA | Topics | Keywords | | --- | --- | --- | | (SSL) | Prescriptive Processes | Open source secure development | @@ -892,7 +892,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/2I_JSdTu-oI - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication | @@ -909,7 +909,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/pGcJEML1mRo - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) | @@ -926,7 +926,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/icC2Zrno_uM - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) | @@ -943,7 +943,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/Wrg6XZu6Luw - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) | @@ -960,7 +960,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/z4L6Yv5ry1A - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication | @@ -977,7 +977,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/-zcnfmoLjYI - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; AUTHENTICATION - BIOMETRICS | @@ -993,7 +993,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/xHs3LB4Yyrk - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; AUTHENTICATION - OTP (ONE-TIME PASSWORD); AUTHENTICATION - TOKENS | @@ -1009,7 +1009,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/c2dPdQmaVyo - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks | @@ -1027,7 +1027,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/dCBabesIXo8 - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication | @@ -1044,7 +1044,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/rhdcxhSDqp4 - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks | @@ -1061,7 +1061,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/PCXK2cK8tpE - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks | @@ -1079,7 +1079,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/yWJyZEFbchQ - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; theory | @@ -1097,7 +1097,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/i0kO_3ExJv4 - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL) | @@ -1115,7 +1115,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/viSkkNB777k - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; theory; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); ACCESS CONTROL - ROLE-BASED | @@ -1132,7 +1132,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/PGHsb3bg_h4 - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations | @@ -1149,7 +1149,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/Bn3NJhgmdLk - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; ACCESS CONTROL - MATRIX; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations | @@ -1166,7 +1166,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/OT7ifs8PkHI - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations | @@ -1183,7 +1183,7 @@ There are 71 videos with CyBOK metadata. https://youtu.be/f4yBcKkb12g - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | SANDBOX; Application-based access controls: user-based access controls insufficiently limit privileges | @@ -1202,12 +1202,9 @@ There are 71 videos with CyBOK metadata. https://youtu.be/Xgs5akM6ayc - + | KA | Topics | Keywords | | --- | --- | --- | | Authentication, Authorisation & Accountability (AAA) | Authorisation | ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); Application-based access controls: user-based access controls insufficiently limit privileges; Rule-based sandboxes; System call interposition; Integrity level access controls | | Operating Systems & Virtualisation (OSV) | Primitives for Isolation and Mediation | Rule-based controls: Fine grained: AppArmor | | Software Security (SS) | Mitigating Exploitation | limiting privileges | - - - diff --git a/README-CyBOK-Scenarios-Indexed.md b/README-CyBOK-Scenarios-Indexed.md index 72a756679..0bf6a0323 100644 --- a/README-CyBOK-Scenarios-Indexed.md +++ b/README-CyBOK-Scenarios-Indexed.md @@ -8,7 +8,7 @@ You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics > The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the [CyBOK mapping reference](https://www.cybok.org/media/downloads/CyBOk-mapping-reference-v1.1.pdf), mixed case keywords are ones that we have added. -> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. +> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. # Scenarios Indexed By CyBOK Knowledge Area (KA) @@ -3448,5 +3448,3 @@ Command to build VMs and start scenario: ```ruby secgen.rb -s scenarios/labs/web_security/websec_lab.xml run``` [View source](scenarios/labs/web_security/websec_lab.xml) - - diff --git a/lib/CyBOK/template_CyBOK_scenarios.md.erb b/lib/CyBOK/template_CyBOK_scenarios.md.erb index 65b39101b..09c6b45af 100644 --- a/lib/CyBOK/template_CyBOK_scenarios.md.erb +++ b/lib/CyBOK/template_CyBOK_scenarios.md.erb @@ -8,7 +8,7 @@ You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics > The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the [CyBOK mapping reference](https://www.cybok.org/media/downloads/CyBOk-mapping-reference-v1.1.pdf), mixed case keywords are ones that we have added. -> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. +> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. # Scenarios Indexed By CyBOK Knowledge Area (KA) diff --git a/lib/CyBOK/template_CyBOK_videos.md.erb b/lib/CyBOK/template_CyBOK_videos.md.erb index e6ce01d60..2458d69ad 100644 --- a/lib/CyBOK/template_CyBOK_videos.md.erb +++ b/lib/CyBOK/template_CyBOK_videos.md.erb @@ -6,7 +6,7 @@ This file is an autogenerated index of the lecture videos referenced by scenario There are <%= VIDEO_HASH.length %> videos with CyBOK metadata. -> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. +> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. # Lecture Videos