Logo
TLCTC Navigator
PDF
  • Executive Summary
  • Introduction
  • Objectives
  • Assumptions - Axioms
    • Why Start With Assumptions?
    • Agreement Required
    • Key Axioms & Assumptions
  • The Thought Experiment
  • Definitions
    • #1 Abuse of Functions
    • #2 Exploiting Server
    • #3 Exploiting Client
    • #4 Identity Theft
    • #5 Man in the Middle
    • #6 Flooding Attack
    • #7 Malware
    • #8 Physical Attack
    • #9 Social Engineering
    • #10 Supply Chain Attack
    • Data Processing Pathways
    • Clarifications
  • Bridging Strategy & Ops
    • Strategic Layer
    • Operational Layer
    • Cyber Risk Events & Incidents
    • Consequences
    • Integration Between Layers
  • The Anatomy of Risk
    • Cyber Bow-Tie & Risk-Mgmt
    • Clarification on Central Event
  • Data Risk Event Types
  • Sequences in Threats
    • There are NO overlappings
    • Sequences: An Example
  • Concept Applicability
    • At Interface Level (API)
    • At Function Call Level
    • Vertical Stack Application
  • Standardizing Strategy
    • Refinement of Clusters
    • Standardizing Operational
    • Buzz-Word Refinement
  • Standardized Notation
    • Notation Convention
    • Real-World Application
    • Domain Boundaries
    • MFA Bombing Example
  • IT Systems & Assets
    • The Challenge
    • Core Principles
    • Strategic vs. Operational
    • Conclusion
  • Appendices
    • A. Leveraging NIST CSF
      • Control Framework
      • Application
      • KRI, KCI and KPI
      • Hierarchical Framework
    • B. SSDLC Integration
      • Secure Coding Practices
    • C. Cyber Threat Radars
      • The Challenge
      • Enter the Radar
      • Key Benefits
      • Versatile Application
      • Understanding Visuals
      • Attacker profiles
    • D. Threat Intel (MITRE)
      • Enhancing STIX
      • Enhancing ATT&CK
    • E. Real World Examples
      • NSO Pegasus
      • Emotet@Heise
      • Cobalt Strike
    • F. Oversimplification?
Navigator V1.9.1