|
|
|
|
@@ -1,63 +1,73 @@
|
|
|
|
|
This file is an autogenerated index and cross referencing of all the scenarios that have CyBOK metadata.
|
|
|
|
|
# SecGen Scenarios and CyBOK
|
|
|
|
|
|
|
|
|
|
# By Knowledge Area
|
|
|
|
|
The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations.
|
|
|
|
|
|
|
|
|
|
This file is an autogenerated index and cross referencing of all the SecGen scenarios that have CyBOK metadata.
|
|
|
|
|
|
|
|
|
|
You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics](#scenarios-indexed-by-knowledge-area-ka). The list of scenarios in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology).
|
|
|
|
|
|
|
|
|
|
There are 93 scenarios with CyBOK metadata.
|
|
|
|
|
|
|
|
|
|
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
|
|
|
|
|
|
|
|
|
# Scenarios Indexed By CyBOK Knowledge Area (KA)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# AAA
|
|
|
|
|
## AAA
|
|
|
|
|
|
|
|
|
|
## AAA Scenarios
|
|
|
|
|
### AAA Scenarios
|
|
|
|
|
examples/cybok_example.xml</br>examples/cybok_example_no_systems.xml</br>labs/authentication_and_access_controls/ads_1_authentication.xml</br>labs/authentication_and_access_controls/ads_2_pam.xml</br>labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_4_suid.xml</br>labs/authentication_and_access_controls/ads_5_facls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/file-integrity.xml</br>labs/labtainers/ldap.xml</br>labs/labtainers/macs-hash.xml</br>labs/labtainers/nix-commands.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/radius.xml</br>labs/labtainers/setuid-env.xml</br>labs/response_and_investigation/1_integrity_protection.xml</br>labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml
|
|
|
|
|
|
|
|
|
|
## AAA Scenarios by Topics
|
|
|
|
|
### AAA Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Authorisation | examples/cybok_example.xml</br>examples/cybok_example_no_systems.xml</br>labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_4_suid.xml</br>labs/authentication_and_access_controls/ads_5_facls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/ldap.xml</br>labs/labtainers/nix-commands.xml</br>labs/labtainers/setuid-env.xml</br>labs/response_and_investigation/1_integrity_protection.xml
|
|
|
|
|
Authentication | labs/authentication_and_access_controls/ads_1_authentication.xml</br>labs/authentication_and_access_controls/ads_2_pam.xml</br>labs/labtainers/file-integrity.xml</br>labs/labtainers/ldap.xml</br>labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/radius.xml
|
|
|
|
|
Accountability | labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml
|
|
|
|
|
|
|
|
|
|
# C
|
|
|
|
|
## C
|
|
|
|
|
|
|
|
|
|
## C Scenarios
|
|
|
|
|
### C Scenarios
|
|
|
|
|
examples/cybok_example.xml</br>examples/cybok_example_no_systems.xml</br>labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/pubkey.xml</br>labs/labtainers/ssh-agent.xml</br>labs/labtainers/sshlab.xml</br>labs/labtainers/ssl.xml
|
|
|
|
|
|
|
|
|
|
## C Scenarios by Topics
|
|
|
|
|
### C Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Cryptography | examples/cybok_example.xml</br>examples/cybok_example_no_systems.xml
|
|
|
|
|
Public-Key Cryptography | labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/ssh-agent.xml</br>labs/labtainers/sshlab.xml</br>labs/labtainers/ssl.xml
|
|
|
|
|
Schemes | labs/labtainers/pubkey.xml
|
|
|
|
|
|
|
|
|
|
# OSVS
|
|
|
|
|
## OSVS
|
|
|
|
|
|
|
|
|
|
## OSVS Scenarios
|
|
|
|
|
### OSVS Scenarios
|
|
|
|
|
labs/authentication_and_access_controls/ads_1_authentication.xml</br>labs/authentication_and_access_controls/ads_2_pam.xml</br>labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_4_suid.xml</br>labs/authentication_and_access_controls/ads_5_facls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/capabilities.xml</br>labs/labtainers/setuid-env.xml</br>labs/response_and_investigation/1_integrity_protection.xml</br>labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/7_live_analysis.xml
|
|
|
|
|
|
|
|
|
|
## OSVS Scenarios by Topics
|
|
|
|
|
### OSVS Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Primitives for Isolation and Mediation | labs/authentication_and_access_controls/ads_1_authentication.xml</br>labs/authentication_and_access_controls/ads_2_pam.xml</br>labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_4_suid.xml</br>labs/authentication_and_access_controls/ads_5_facls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/capabilities.xml</br>labs/labtainers/setuid-env.xml</br>labs/response_and_investigation/1_integrity_protection.xml
|
|
|
|
|
Role of Operating Systems | labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml
|
|
|
|
|
OS Hardening | labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/7_live_analysis.xml
|
|
|
|
|
|
|
|
|
|
# WMS
|
|
|
|
|
## WMS
|
|
|
|
|
|
|
|
|
|
## WMS Scenarios
|
|
|
|
|
### WMS Scenarios
|
|
|
|
|
labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/labtainers/sql-inject.xml</br>labs/web_security/websec_lab.xml
|
|
|
|
|
|
|
|
|
|
## WMS Scenarios by Topics
|
|
|
|
|
### WMS Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Fundamental Concepts and Approaches | labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/web_security/websec_lab.xml
|
|
|
|
|
Server-Side Vulnerabilities and Mitigations | labs/labtainers/sql-inject.xml</br>labs/web_security/websec_lab.xml
|
|
|
|
|
Client-Side Vulnerabilities and Mitigations | labs/web_security/websec_lab.xml
|
|
|
|
|
|
|
|
|
|
# SS
|
|
|
|
|
## SS
|
|
|
|
|
|
|
|
|
|
## SS Scenarios
|
|
|
|
|
### SS Scenarios
|
|
|
|
|
labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/introducing_attacks/6_exploitation.xml</br>labs/labtainers/bufoverflow.xml</br>labs/labtainers/formatstring.xml</br>labs/labtainers/pass-crack.xml</br>labs/labtainers/retlibc.xml</br>labs/labtainers/sql-inject.xml</br>labs/software_security_exploitation/1_c_asm_iof.xml</br>labs/software_security_exploitation/2_race_conditions_format_str.xml</br>labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml</br>labs/software_security_exploitation/4_exploit_development.xml</br>labs/software_security_exploitation/5_linux_bof_format.xml</br>labs/software_security_exploitation/6_linux_stack_bof.xml</br>labs/software_security_exploitation/7_linux_nx_bypass.xml</br>labs/software_security_exploitation/8_linux_aslr_bypass.xml</br>labs/web_security/websec_lab.xml
|
|
|
|
|
|
|
|
|
|
## SS Scenarios by Topics
|
|
|
|
|
### SS Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Mitigating Exploitation | labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/bufoverflow.xml</br>labs/labtainers/retlibc.xml</br>labs/software_security_exploitation/7_linux_nx_bypass.xml</br>labs/software_security_exploitation/8_linux_aslr_bypass.xml
|
|
|
|
|
@@ -66,12 +76,12 @@ Authentication | labs/labtainers/pass-crack.xml
|
|
|
|
|
Prevention of Vulnerabilities | labs/labtainers/sql-inject.xml</br>labs/software_security_exploitation/1_c_asm_iof.xml</br>labs/software_security_exploitation/2_race_conditions_format_str.xml</br>labs/web_security/websec_lab.xml
|
|
|
|
|
Detection of Vulnerabilities | labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml
|
|
|
|
|
|
|
|
|
|
# NS
|
|
|
|
|
## NS
|
|
|
|
|
|
|
|
|
|
## NS Scenarios
|
|
|
|
|
### NS Scenarios
|
|
|
|
|
labs/introducing_attacks/1_intro_linux.xml</br>labs/introducing_attacks/4_dns_footprinting.xml</br>labs/introducing_attacks/5_scanning.xml</br>labs/labtainers/arp-spoof.xml</br>labs/labtainers/denyhost.xml</br>labs/labtainers/dmz-example.xml</br>labs/labtainers/dmz-lab.xml</br>labs/labtainers/iptables-ics.xml</br>labs/labtainers/iptables.xml</br>labs/labtainers/iptables2.xml</br>labs/labtainers/local-dns.xml</br>labs/labtainers/nix-commands.xml</br>labs/labtainers/nmap-discovery.xml</br>labs/labtainers/nmap-ssh.xml</br>labs/labtainers/pcapanalysis.xml</br>labs/labtainers/pubkey.xml</br>labs/labtainers/radius.xml</br>labs/labtainers/remote-dns.xml</br>labs/labtainers/routing-basics.xml</br>labs/labtainers/routing-basics2.xml</br>labs/labtainers/snort.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml
|
|
|
|
|
|
|
|
|
|
## NS Scenarios by Topics
|
|
|
|
|
### NS Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Network Protocols and Vulnerability | labs/introducing_attacks/1_intro_linux.xml</br>labs/labtainers/arp-spoof.xml</br>labs/labtainers/local-dns.xml</br>labs/labtainers/remote-dns.xml
|
|
|
|
|
@@ -80,12 +90,12 @@ Network Defence Tools | labs/labtainers/denyhost.xml</br>labs/labtainers/dmz-exa
|
|
|
|
|
Internet Architecture | labs/labtainers/iptables-ics.xml</br>labs/labtainers/iptables.xml</br>labs/labtainers/iptables2.xml</br>labs/labtainers/pubkey.xml</br>labs/labtainers/radius.xml</br>labs/labtainers/routing-basics.xml</br>labs/labtainers/routing-basics2.xml
|
|
|
|
|
OSI (OPEN SYSTEM INTERCONNECT) MODEL | labs/labtainers/pcapanalysis.xml
|
|
|
|
|
|
|
|
|
|
# SOIM
|
|
|
|
|
## SOIM
|
|
|
|
|
|
|
|
|
|
## SOIM Scenarios
|
|
|
|
|
### SOIM Scenarios
|
|
|
|
|
labs/introducing_attacks/1_intro_linux.xml</br>labs/introducing_attacks/2_malware_msf_payloads.xml</br>labs/introducing_attacks/3_vulnerabilities.xml</br>labs/introducing_attacks/4_dns_footprinting.xml</br>labs/introducing_attacks/5_scanning.xml</br>labs/introducing_attacks/6_exploitation.xml</br>labs/introducing_attacks/7_post-exploitation.xml</br>labs/introducing_attacks/8_vulnerability_analysis.xml</br>labs/labtainers/arp-spoof.xml</br>labs/labtainers/backups.xml</br>labs/labtainers/backups2.xml</br>labs/labtainers/capabilities.xml</br>labs/labtainers/centos-log.xml</br>labs/labtainers/centos-log2.xml</br>labs/labtainers/cyberciege.xml</br>labs/labtainers/denyhost.xml</br>labs/labtainers/file-integrity.xml</br>labs/labtainers/ldap.xml</br>labs/labtainers/metasploit.xml</br>labs/labtainers/nmap-ssh.xml</br>labs/labtainers/packet-introspection.xml</br>labs/labtainers/pcapanalysis.xml</br>labs/labtainers/snort.xml</br>labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/3_backups_and_recovery.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml
|
|
|
|
|
|
|
|
|
|
## SOIM Scenarios by Topics
|
|
|
|
|
### SOIM Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
PENETRATION TESTING | labs/introducing_attacks/1_intro_linux.xml</br>labs/introducing_attacks/2_malware_msf_payloads.xml</br>labs/introducing_attacks/3_vulnerabilities.xml</br>labs/introducing_attacks/4_dns_footprinting.xml</br>labs/introducing_attacks/5_scanning.xml</br>labs/introducing_attacks/6_exploitation.xml</br>labs/introducing_attacks/7_post-exploitation.xml</br>labs/introducing_attacks/8_vulnerability_analysis.xml</br>labs/labtainers/metasploit.xml
|
|
|
|
|
@@ -95,12 +105,12 @@ INCIDENT RESPONSE | labs/labtainers/backups.xml</br>labs/labtainers/backups2.xml
|
|
|
|
|
CM (CONFIGURATION MANAGEMENT) | labs/labtainers/denyhost.xml</br>labs/labtainers/nmap-ssh.xml
|
|
|
|
|
Analyse: Analysis Methods | labs/labtainers/snort.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml
|
|
|
|
|
|
|
|
|
|
# MAT
|
|
|
|
|
## MAT
|
|
|
|
|
|
|
|
|
|
## MAT Scenarios
|
|
|
|
|
### MAT Scenarios
|
|
|
|
|
labs/introducing_attacks/2_malware_msf_payloads.xml</br>labs/introducing_attacks/3_vulnerabilities.xml</br>labs/introducing_attacks/5_scanning.xml</br>labs/introducing_attacks/6_exploitation.xml</br>labs/introducing_attacks/7_post-exploitation.xml</br>labs/introducing_attacks/8_vulnerability_analysis.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/bufoverflow.xml</br>labs/labtainers/formatstring.xml</br>labs/labtainers/gdblesson.xml</br>labs/labtainers/ida.xml</br>labs/labtainers/metasploit.xml</br>labs/labtainers/retlibc.xml</br>labs/labtainers/snort.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml</br>labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml</br>labs/software_and_malware_analysis/3_c_and_asm.xml</br>labs/software_and_malware_analysis/4_asm.xml</br>labs/software_and_malware_analysis/5_ghidra.xml</br>labs/software_and_malware_analysis/6_ghidra_analysis.xml</br>labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml</br>labs/software_and_malware_analysis/7_dynamic.xml</br>labs/software_and_malware_analysis/8_anti_sre.xml</br>labs/software_and_malware_analysis/9_malware_behaviour.xml</br>labs/software_security_exploitation/4_exploit_development.xml</br>labs/software_security_exploitation/5_linux_bof_format.xml</br>labs/software_security_exploitation/6_linux_stack_bof.xml</br>labs/software_security_exploitation/7_linux_nx_bypass.xml</br>labs/software_security_exploitation/8_linux_aslr_bypass.xml
|
|
|
|
|
|
|
|
|
|
## MAT Scenarios by Topics
|
|
|
|
|
### MAT Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Malware Taxonomy | labs/introducing_attacks/2_malware_msf_payloads.xml</br>labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml</br>labs/software_and_malware_analysis/9_malware_behaviour.xml
|
|
|
|
|
@@ -110,50 +120,50 @@ Malicious Activities by Malware | labs/introducing_attacks/5_scanning.xml</br>la
|
|
|
|
|
MALCODE/MALWARE | labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml
|
|
|
|
|
Malware Detection | labs/labtainers/snort.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml
|
|
|
|
|
|
|
|
|
|
# F
|
|
|
|
|
## F
|
|
|
|
|
|
|
|
|
|
## F Scenarios
|
|
|
|
|
### F Scenarios
|
|
|
|
|
labs/labtainers/file-deletion.xml</br>labs/labtainers/file-integrity.xml</br>labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/packet-introspection.xml</br>labs/labtainers/pass-crack.xml</br>labs/labtainers/pcapanalysis.xml</br>labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml</br>labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml
|
|
|
|
|
|
|
|
|
|
## F Scenarios by Topics
|
|
|
|
|
### F Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Operating System Analysis | labs/labtainers/file-deletion.xml</br>labs/labtainers/file-integrity.xml</br>labs/response_and_investigation/8_dead_analysis.xml
|
|
|
|
|
Artifact Analysis | labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/pass-crack.xml</br>labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml
|
|
|
|
|
Main Memory Forensics | labs/labtainers/packet-introspection.xml</br>labs/labtainers/pcapanalysis.xml</br>labs/response_and_investigation/7_live_analysis.xml
|
|
|
|
|
|
|
|
|
|
# CPS
|
|
|
|
|
## CPS
|
|
|
|
|
|
|
|
|
|
## CPS Scenarios
|
|
|
|
|
### CPS Scenarios
|
|
|
|
|
labs/labtainers/iptables-ics.xml</br>labs/labtainers/plc-app.xml</br>labs/labtainers/plc-forensics-adv.xml</br>labs/labtainers/plc-forensics.xml</br>labs/labtainers/plc.xml</br>labs/labtainers/softplc.xml</br>labs/labtainers/softplc2.xml</br>labs/labtainers/ssl.xml
|
|
|
|
|
|
|
|
|
|
## CPS Scenarios by Topics
|
|
|
|
|
### CPS Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Cyber-Physical Systems Domains | labs/labtainers/iptables-ics.xml</br>labs/labtainers/plc-app.xml</br>labs/labtainers/plc-forensics-adv.xml</br>labs/labtainers/plc-forensics.xml</br>labs/labtainers/plc.xml</br>labs/labtainers/softplc.xml</br>labs/labtainers/softplc2.xml</br>labs/labtainers/ssl.xml
|
|
|
|
|
Cyber-Physical Systems | labs/labtainers/iptables-ics.xml</br>labs/labtainers/plc-app.xml</br>labs/labtainers/plc-forensics-adv.xml</br>labs/labtainers/plc-forensics.xml</br>labs/labtainers/plc.xml</br>labs/labtainers/softplc.xml</br>labs/labtainers/softplc2.xml</br>labs/labtainers/ssl.xml
|
|
|
|
|
|
|
|
|
|
# WAM
|
|
|
|
|
## WAM
|
|
|
|
|
|
|
|
|
|
## WAM Scenarios
|
|
|
|
|
### WAM Scenarios
|
|
|
|
|
labs/labtainers/iptables-ics.xml</br>labs/labtainers/iptables.xml</br>labs/labtainers/iptables2.xml
|
|
|
|
|
|
|
|
|
|
## WAM Scenarios by Topics
|
|
|
|
|
### WAM Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
FIREWALLS | labs/labtainers/iptables-ics.xml</br>labs/labtainers/iptables.xml</br>labs/labtainers/iptables2.xml
|
|
|
|
|
|
|
|
|
|
# HF
|
|
|
|
|
## HF
|
|
|
|
|
|
|
|
|
|
## HF Scenarios
|
|
|
|
|
### HF Scenarios
|
|
|
|
|
labs/labtainers/ssl.xml
|
|
|
|
|
|
|
|
|
|
## HF Scenarios by Topics
|
|
|
|
|
### HF Scenarios by Topics
|
|
|
|
|
| Topic | Scenario |
|
|
|
|
|
| --- | --- |
|
|
|
|
|
Fitting the Task to the Human | labs/labtainers/ssl.xml
|
|
|
|
|
|
|
|
|
|
# By Scenario
|
|
|
|
|
# Scenario CyBOK Keywords
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## examples/cybok_example.xml
|
|
|
|
|
|