{"id":178,"date":"2015-12-22T14:47:31","date_gmt":"2015-12-22T14:47:31","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=178"},"modified":"2017-06-10T09:56:20","modified_gmt":"2017-06-10T08:56:20","slug":"specification-exemplars-for-security","status":"publish","type":"post","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=178","title":{"rendered":"Specification exemplars for security"},"content":{"rendered":"<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/12\/stcsContext.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-425\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/12\/stcsContext-300x237.jpg\" alt=\"\" width=\"300\" height=\"237\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/12\/stcsContext-300x237.jpg 300w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/12\/stcsContext-768x608.jpg 768w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/12\/stcsContext-1024x810.jpg 1024w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/12\/stcsContext.jpg 1952w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>As part of a re-vamp of the <a href=\"http:\/\/cairis.org\">CAIRIS<\/a> website, BU researchers have made specification exemplars for security freely available for the community.<\/p>\n<p>These exemplars include personas of penetration testers, and a fictional critical infrastructure organisation. \u00a0These exemplars are based on real-world data, and are useful for researchers or practitioners for validating solutions, or educators for supporting cybersecurity education.<\/p>\n<p>You can read more about these exemplars and CAIRIS\u00a0<a href=\"http:\/\/cairis.org\/cairis\/examples_in_action\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>\u00a0.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of a re-vamp of the CAIRIS website, BU researchers have made specification exemplars for security freely available for the community. These exemplars include personas of penetration testers, and a fictional critical infrastructure organisation. \u00a0These exemplars are based on real-world data, and are useful for researchers or practitioners for validating solutions, or educators for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[4,5,6,8],"tags":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/178"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=178"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/178\/revisions"}],"predecessor-version":[{"id":426,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/178\/revisions\/426"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}