SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

CyberML™ (Cyber Modeling Language™)

1 min read
in Software, Tool

The CyberML™ (Cyber Modeling Language™) is a UML/SysML profile and model library for specifying the architectures and designs of cybersecurity applications.

Since CyberML is designed and implemented as a UML profile (UML dialect) and model library it is compatible with the OMG UML and OMG SysML architecture modeling language standards, and can be implemented in popular visual modeling tools that comply with those standards.

The CyberML profile specifies basic constructs for specifying cybersecurity architectures and designs that include, but are not limited to, the following:

* network nodes (computers, NICs, repeaters, hubs, bridges, switches, routers, modems, gateways, etc.)
* network communication protocols (TCP/IP, DHCP, DNS, FTP, HTTP, IMAP, SMTP, SMS, MMS, etc.)
* network connections between nodes using specific protocols
* network topologies among nodes (point-to-point, bus, star, ring or circular, mesh, tree, daisy chain, hybrid)
* cybersecurity devices (firewalls, Intrusion Detection/Protection Systems [IDS/IPS], encryption/decryption devices, etc.)
* secure network communication protocols (SSL, TLS, HTTPS, etc.)
* strong encryption techniques (end-to-end encryption, Zero-knowledge Privacy (ZKP), blockchain, etc.)

Visit Website

Related

Tags: ArchitectsCareersCyberMLCybersecurity architectsSecurity architectsSysMLToolsUML
4
VIEWS
ADVERTISEMENT

Related Posts

Awesome-SOAR List – Software

Awesome-SOAR List – Software

May 2, 2022
Tines – Software

Tines – Software

May 2, 2022
ThreatQuotient SOAR Platform

ThreatQuotient SOAR Platform

May 2, 2022
ArcSight SOAR – Software

ArcSight SOAR – Software

May 2, 2022

More Articles

Quotes

“With quantum computing, it’s more like navigating a rocket ship…”

December 8, 2020
Alerts

NSA and CISA Release Guidance on Securing 5G Cloud Infrastructures

November 19, 2021

“Conceptionally, Blockchain is TCP/IP applied to the world of business and transactions…”

February 22, 2021
Cyber101

Vulnerability – Definition

April 28, 2022
Course

On Premises Management, Security, and Upgrade

April 21, 2022
Document

Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations

April 15, 2022
Alerts

Asylum Ambuscade spear-phishing campaign targets Ukrainian refugees

March 2, 2022
Course

Security Architecture Modeling

February 10, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....