A wordle of terms from the ISTS 2012 Summer Camp.
So far, this Wordle contains topics from:
USENIX Security 2012
Eurosec 2012 Workshop
Infosec terms...generate a Wordle!
Analysis of network and security protocols Applications of cryptographic techniques Attacks with novel insights, techniques, or results Authentication and authorization of users, systems, and applications Automated tools for source code analysis Botnets Cryptographic implementation analysis and construction Denial-of-service attacks and countermeasures Embedded systems security File and filesystem security Forensics and diagnostics for security Hardware security Human-computer interaction, security, and privacy Intrusion and anomaly detection and prevention Malicious code analysis, anti-virus, anti-spyware Mobile system security Network infrastructure security Operating system security Privacy-enhancing technologies Security architectures Security education and training Security for critical infrastructures Security in heterogeneous and large-scale environments Security in ubiquitous computing environments Security policy Self-protecting and self-healing systems Techniques for developing secure systems Technologies for trustworthy computing Wireless security Web security, including client-side and server-side security Access control Assurance Audit and audit reduction Biometrics Boundary control devices Certification and accreditation Database security Denial of service protection Distributed systems security Electronic commerce security Enterprise security management Forensics Identity management Incident response planning Insider threat protection Integrity Intellectual property rights protection Intrusion detection and prevention Malware Mobile and wireless security Multimedia security Network resiliency Operating systems security Peer-to-peer security Privacy and data protection Privilege management Product evaluation criteria and compliance Risk/vulnerability assessment Securing cloud infrastructures Security engineering and management Security in service oriented architectures Security usability Software security Supply chain risk management Trust management Virtualization security VoIP security Web 2.0/3.0 security Access control Accountability Anonymity Application security Attacks and defenses Authentication Censorship and censorship-resistance Distributed systems security Embedded systems security Forensics Hardware security Intrusion detection Language-based security Malware Metrics Network security Privacy-preserving systems Protocol security Secure information flow Security and privacy policies Security architectures System security Usability and security Web security Intrusion detection and prevention Malware prevention, detection, analysis, and containment Embedded System Security Web application security New attacks against computers and networks Insider attack detection IDS cooperation and event correlation Intrusion detection assessment and benchmarking Formal models, analysis, and standards Deception systems and honeypots Vulnerability analysis Digital forensics Secure Software Development Adversarial machine learning for security Visualization techniques Legal, social, and privacy issues Network exfiltration Botnet analysis, detection, and mitigation Phishing and Spam detection and prevention Security and privacy in cloud computing Online money laundering and Underground economy Hardware vulnerabilities Binary analysis and Reverse engineering Security and Privacy of Social Networks Smartphone Security Network perimeter controls: firewalls, packet filters, application gateways Network protocol security: routing, naming, network management Cloud computing security Security issues in Future Internet architecture and design Security of web-based applications and services Anti-malware techniques: detection, analysis, and prevention Secure future home networks, Internet of Things, body-area networks Intrusion prevention, detection, and response Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques Privacy and anonymity technologies Security for wireless, mobile networks Security of personal communication systems Vehicular Ad-hoc Network (VANETs) Security Security of peer-to-peer and overlay network systems Electronic commerce security: e.g., payments, notarization, timestamping. Network security policies: implementation deployment, management Intellectual property protection: protocols, implementations, DRM Public key infrastructures, key management, certification, and revocation Security for Emerging Technologies Special problems and case studies: cost, usability, security vs efficiency Collaborative applications: teleconferencing and video-conferencing Smart Grid Security Secure Electronic Voting Security of large-scale critical infrastructures Trustworthy Computing for network protocols and distributed systems Network and distributed systems forensics New attacks, evasion techniques, and defenses. Operating system security. Mobile systems security. Malicious code analysis and detection. Web security. Identity management and anonymity. Hardware and physical security. Virtual machines and hypervisors. Measuring security. Trusted computing and its applications. Systems-based forensics. Systems work on fighting spam/phishing.