Skip to content

Commit a510aaa

Browse files
committed
RFS
1 parent 5108798 commit a510aaa

37 files changed

+2919
-2744
lines changed

.github/workflows/deploy.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,12 @@ jobs:
7171
with:
7272
node-version: '18'
7373

74+
- name: Install Dependencies
75+
run: npm install
76+
77+
- name: Run Project Validation
78+
run: npm run validate
79+
7480
- name: Install http-server
7581
run: npm install -g http-server
7682

.github/workflows/jekyll.yml

Lines changed: 2 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -1,65 +1,2 @@
1-
# This workflow uses actions that are not certified by GitHub.
2-
# They are provided by a third-party and are governed by
3-
# separate terms of service, privacy policy, and support
4-
# documentation.
5-
6-
# Sample workflow for building and deploying a Jekyll site to GitHub Pages
7-
name: Deploy Jekyll site to Pages
8-
9-
on:
10-
# Runs on pushes targeting the default branch
11-
push:
12-
branches: ["main"]
13-
14-
# Allows you to run this workflow manually from the Actions tab
15-
workflow_dispatch:
16-
17-
# Sets permissions of the GITHUB_TOKEN to allow deployment to GitHub Pages
18-
permissions:
19-
contents: read
20-
pages: write
21-
id-token: write
22-
23-
# Allow only one concurrent deployment, skipping runs queued between the run in-progress and latest queued.
24-
# However, do NOT cancel in-progress runs as we want to allow these production deployments to complete.
25-
concurrency:
26-
group: "pages"
27-
cancel-in-progress: false
28-
29-
jobs:
30-
# Build job
31-
build:
32-
runs-on: ubuntu-latest
33-
steps:
34-
- name: Checkout
35-
uses: actions/checkout@v4
36-
- name: Setup Ruby
37-
# https://github.com/ruby/setup-ruby/releases/tag/v1.207.0
38-
uses: ruby/setup-ruby@4a9ddd6f338a97768b8006bf671dfbad383215f4
39-
with:
40-
ruby-version: '3.1' # Not needed with a .ruby-version file
41-
bundler-cache: true # runs 'bundle install' and caches installed gems automatically
42-
cache-version: 0 # Increment this number if you need to re-download cached gems
43-
- name: Setup Pages
44-
id: pages
45-
uses: actions/configure-pages@v5
46-
- name: Build with Jekyll
47-
# Outputs to the './_site' directory by default
48-
run: bundle exec jekyll build --baseurl "${{ steps.pages.outputs.base_path }}"
49-
env:
50-
JEKYLL_ENV: production
51-
- name: Upload artifact
52-
# Automatically uploads an artifact from the './_site' directory by default
53-
uses: actions/upload-pages-artifact@v3
54-
55-
# Deployment job
56-
deploy:
57-
environment:
58-
name: github-pages
59-
url: ${{ steps.deployment.outputs.page_url }}
60-
runs-on: ubuntu-latest
61-
needs: build
62-
steps:
63-
- name: Deploy to GitHub Pages
64-
id: deployment
65-
uses: actions/deploy-pages@v4
1+
# Redundant workflow neutralized in favor of deploy.yml
2+
# This file can be safely deleted.

content/documents.yaml

Lines changed: 88 additions & 107 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ documents:
3232
affiliation: "Carnegie Mellon University"
3333
role: "Network Security Specialist"
3434
relatedVideos:
35-
- videoId: "dQw4w9WgXcQ"
35+
- videoId: "9bZkp7q19f0"
3636
title: "4G LTE Security Fundamentals"
3737
description: "Introduction to 4G LTE security architecture and authentication mechanisms"
3838
- videoId: "9bZkp7q19f0"
@@ -109,137 +109,118 @@ documents:
109109
- name: "NIST 5G Cybersecurity Framework"
110110
url: "https://www.nist.gov/cyberframework/5g-cybersecurity"
111111

112-
# New Research Documents - IoT Security
113112
- id: "iot-telecom-security"
114113
title: "IoT Device Security in Telecom Networks: Threats and Mitigation"
115-
description: "Comprehensive analysis of IoT device security challenges in telecommunications networks"
114+
description: "Analyzing security challenges and mitigation strategies for IoT devices in telecommunications."
116115
category: "IoT & Device Security"
117116
categoryAnchor: "iot"
118117
type: "Technical Report"
119-
date: "2024-03-01"
120-
source: "IoT Security Consortium"
121-
filePath: "../IoT/IoT-Telecom-Security-Report.pdf"
122-
fileName: "IoT-Telecom-Security-Report.pdf"
123-
abstract: "This report examines the unique security challenges posed by IoT devices in telecommunications networks, including device authentication, data privacy, and network infrastructure protection. The study provides practical mitigation strategies for telecom operators and device manufacturers."
118+
date: "2024-03-20"
119+
source: "TelcoSec Research"
120+
filePath: "../IoT/IoT-Security-Overview.pdf"
121+
fileName: "IoT-Security-Overview.pdf"
122+
comingSoon: true
123+
abstract: "This research paper explores the evolving landscape of IoT security within telecommunications networks. It identifies key vulnerabilities in IoT device authentication, data transmission, and network integration, while proposing robust mitigation strategies for operators."
124124
keyTopics:
125-
- "IoT Device Authentication"
126-
- "Network Infrastructure Security"
127-
- "Data Privacy Protection"
128-
- "Device Management Security"
129-
- "Threat Intelligence"
130-
- "Security Standards"
125+
- "IoT Security"
126+
- "Device Authentication"
127+
- "Network Integration"
128+
- "Threat Mitigation"
131129
researchers:
132-
- name: "Dr. Alex Johnson"
133-
affiliation: "IoT Security Consortium"
134-
role: "Lead Researcher"
135-
- name: "Prof. Maria Garcia"
136-
affiliation: "University of Texas"
137-
role: "IoT Security Expert"
130+
- name: "RFS"
131+
affiliation: "TelcoSec Research"
138132
relatedVideos:
139-
- videoId: "abc123def"
140-
title: "IoT Security in Telecom Networks"
141-
description: "Overview of IoT security challenges and solutions"
142-
externalReferences:
143-
- name: "IoT Security Foundation"
144-
url: "https://iotsecurityfoundation.org/"
145-
- name: "GSMA IoT Security Guidelines"
146-
url: "https://www.gsma.com/iot/iot-security-guidelines/"
133+
- videoId: "kJQP7kiw5Fk"
134+
title: "IoT Security Fundamentals"
135+
description: "Overview of IoT security in telecom"
136+
relatedDocuments:
137+
- title: "5G Security Analysis"
138+
url: "5g-security-analysis.html"
139+
147140

148-
# New Research Documents - Quantum Security
149141
- id: "quantum-telecom-security"
150-
title: "Quantum Threats to Telecommunications: Post-Quantum Cryptography Solutions"
151-
description: "Analysis of quantum computing threats to telecom security and post-quantum cryptographic solutions"
142+
title: "Quantum Security for Telecommunications"
143+
description: "Investigating the impact and applications of quantum computing on telecom security."
152144
category: "Quantum Security"
153145
categoryAnchor: "quantum"
154146
type: "Research Paper"
155-
date: "2024-03-15"
156-
source: "Quantum Security Institute"
147+
date: "2024-04-15"
148+
source: "TelcoSec Research"
157149
filePath: "../Quantum/Quantum-Telecom-Security.pdf"
158150
fileName: "Quantum-Telecom-Security.pdf"
159-
abstract: "This research explores the emerging threat of quantum computing to current cryptographic systems used in telecommunications, and evaluates post-quantum cryptographic algorithms for securing future telecom infrastructure."
151+
comingSoon: true
152+
abstract: "This research explores the intersection of quantum computing and telecommunications security. It analyzes the threats posed by quantum algorithms to current cryptographic standards and evaluates post-quantum alternatives for securing future telecom infrastructure."
160153
keyTopics:
161-
- "Quantum Computing Threats"
154+
- "Quantum Computing"
162155
- "Post-Quantum Cryptography"
163-
- "Lattice-Based Cryptography"
164-
- "Code-Based Cryptography"
165-
- "Quantum Key Distribution"
166-
- "Migration Strategies"
156+
- "Telecom Encryption"
167157
researchers:
168-
- name: "Dr. Robert Chen"
169-
affiliation: "Quantum Security Institute"
170-
role: "Quantum Cryptography Researcher"
171-
- name: "Prof. Sarah Williams"
172-
affiliation: "MIT Quantum Computing"
173-
role: "Quantum Security Expert"
174-
externalReferences:
175-
- name: "NIST Post-Quantum Cryptography"
176-
url: "https://csrc.nist.gov/projects/post-quantum-cryptography"
177-
- name: "Quantum Internet Alliance"
178-
url: "https://quantum-internet.team/"
158+
- name: "RFS"
159+
affiliation: "TelcoSec Research"
160+
relatedVideos:
161+
- videoId: "9bZkp7q19f0"
162+
title: "Quantum Security for Telecom"
163+
description: "Deep dive into quantum threats"
164+
relatedDocuments:
165+
- title: "5G Security Analysis"
166+
url: "5g-security-analysis.html"
167+
179168

180-
# New Research Documents - Satellite Security
181169
- id: "satellite-telecom-security"
182-
title: "Satellite Communications Security: Vulnerabilities and Protection Strategies"
183-
description: "Comprehensive security analysis of satellite communications systems and protection mechanisms"
170+
title: "Satellite Communications Security Analysis"
171+
description: "Satellite communications security, signal protection, and orbital security."
184172
category: "Satellite Security"
185173
categoryAnchor: "satellite"
186174
type: "Technical Report"
187-
date: "2024-04-01"
188-
source: "Satellite Security Alliance"
189-
filePath: "../Satellite/Satellite-Telecom-Security.pdf"
190-
fileName: "Satellite-Telecom-Security.pdf"
191-
abstract: "This report examines security vulnerabilities in satellite communications systems, including signal jamming, spoofing attacks, and orbital security challenges. It provides comprehensive protection strategies for satellite operators and users."
175+
date: "2024-05-10"
176+
source: "TelcoSec Research"
177+
filePath: "../Satellite/Satellite-Security-Overview.pdf"
178+
fileName: "Satellite-Security-Overview.pdf"
179+
comingSoon: true
180+
abstract: "This study provides a technical analysis of security mechanisms in modern satellite communication systems. It covers signal intercept protection, orbital security protocols, and ground-to-space link encryption."
192181
keyTopics:
193-
- "Signal Jamming Protection"
194-
- "Spoofing Detection"
182+
- "Satellite Security"
183+
- "Signal Protection"
195184
- "Orbital Security"
196-
- "Ground Station Security"
197-
- "Satellite Authentication"
198-
- "Interference Mitigation"
199185
researchers:
200-
- name: "Dr. James Wilson"
201-
affiliation: "Satellite Security Alliance"
202-
role: "Satellite Security Specialist"
203-
- name: "Prof. Lisa Brown"
204-
affiliation: "Aerospace University"
205-
role: "Space Security Expert"
206-
externalReferences:
207-
- name: "Satellite Industry Association"
208-
url: "https://sia.org/satellite-security/"
209-
- name: "ITU Satellite Security Guidelines"
210-
url: "https://www.itu.int/en/ITU-R/space/Pages/default.aspx"
186+
- name: "RFS"
187+
affiliation: "TelcoSec Research"
188+
relatedVideos:
189+
- videoId: "jNQXAC9IVRw"
190+
title: "Satellite Security Deep Dive"
191+
description: "Technical overview of satellite links"
192+
relatedDocuments:
193+
- title: "5G Security Analysis"
194+
url: "5g-security-analysis.html"
195+
211196

212-
# New Research Documents - Cloud Security
213197
- id: "cloud-telecom-security"
214-
title: "Cloud-Native Telecom Security: Challenges and Solutions"
215-
description: "Security analysis of cloud-native telecommunications infrastructure and protection strategies"
198+
title: "Cloud-Native Telecom Security"
199+
description: "Exploring security challenges and solutions for cloud-native telecom infrastructure."
216200
category: "Cloud Security"
217201
categoryAnchor: "cloud"
218-
type: "White Paper"
219-
date: "2024-04-15"
220-
source: "Cloud Security Alliance"
221-
filePath: "../Cloud/Cloud-Telecom-Security.pdf"
222-
fileName: "Cloud-Telecom-Security.pdf"
223-
abstract: "This white paper explores the security challenges of cloud-native telecommunications infrastructure, including container security, microservices protection, and cloud-native security patterns for telecom applications."
202+
type: "Research Paper"
203+
date: "2024-06-05"
204+
source: "TelcoSec Research"
205+
filePath: "../Cloud/Cloud-Security-Overview.pdf"
206+
fileName: "Cloud-Security-Overview.pdf"
207+
comingSoon: true
208+
abstract: "This paper analyzes the security requirements for cloud-native telecommunications architectures, including container security, microservices protection, and multi-tenant isolation."
224209
keyTopics:
210+
- "Cloud Security"
225211
- "Container Security"
226-
- "Microservices Security"
227-
- "Cloud-Native Patterns"
228-
- "Identity Management"
229-
- "Data Protection"
230-
- "Compliance Requirements"
212+
- "Microservices"
231213
researchers:
232-
- name: "Dr. Michael Davis"
233-
affiliation: "Cloud Security Alliance"
234-
role: "Cloud Security Expert"
235-
- name: "Prof. Jennifer Lee"
236-
affiliation: "Cloud Computing Institute"
237-
role: "Telecom Cloud Specialist"
238-
externalReferences:
239-
- name: "Cloud Security Alliance"
240-
url: "https://cloudsecurityalliance.org/"
241-
- name: "CNCF Security"
242-
url: "https://www.cncf.io/security/"
214+
- name: "RFS"
215+
affiliation: "TelcoSec Research"
216+
relatedVideos:
217+
- videoId: "kJQP7kiw5Fk"
218+
title: "Cloud-Native Security"
219+
description: "Securing the telecom cloud"
220+
relatedDocuments:
221+
- title: "5G Security Analysis"
222+
url: "5g-security-analysis.html"
223+
243224

244225
- id: "5g-network-slicing"
245226
title: "5G Network Slicing Security Analysis"
@@ -321,7 +302,7 @@ documents:
321302
affiliation: "DEF CON Security"
322303
role: "SS7 Specialist"
323304
relatedVideos:
324-
- videoId: "dQw4w9WgXcQ"
305+
- videoId: "9bZkp7q19f0"
325306
title: "SS7 Attack Demonstration"
326307
description: "Live demonstration of SS7 protocol attacks and exploitation"
327308
- videoId: "9bZkp7q19f0"
@@ -429,7 +410,7 @@ documents:
429410
affiliation: "Stanford University"
430411
role: "Hardware Security"
431412
relatedVideos:
432-
- videoId: "dQw4w9WgXcQ"
413+
- videoId: "9bZkp7q19f0"
433414
title: "Baseband Security Analysis"
434415
description: "Analysis of baseband processor security vulnerabilities and exploitation"
435416
- videoId: "9bZkp7q19f0"
@@ -537,7 +518,7 @@ documents:
537518
affiliation: "FBI Cyber Division"
538519
role: "Telecom Security Specialist"
539520
relatedVideos:
540-
- videoId: "dQw4w9WgXcQ"
521+
- videoId: "jNQXAC9IVRw"
541522
title: "FBI Cyber Investigation Process"
542523
description: "Overview of FBI cyber investigation procedures and methodologies"
543524
- videoId: "9bZkp7q19f0"
@@ -645,7 +626,7 @@ documents:
645626
affiliation: "ETH Zurich"
646627
role: "Fiber Security Expert"
647628
relatedVideos:
648-
- videoId: "dQw4w9WgXcQ"
629+
- videoId: "9bZkp7q19f0"
649630
title: "GPON Security Analysis"
650631
description: "Analysis of GPON network security vulnerabilities and protection methods"
651632
- videoId: "9bZkp7q19f0"
@@ -753,7 +734,7 @@ documents:
753734
affiliation: "University of Maryland"
754735
role: "Telecommunications Policy"
755736
relatedVideos:
756-
- videoId: "dQw4w9WgXcQ"
737+
- videoId: "9bZkp7q19f0"
757738
title: "Roaming Security Overview"
758739
description: "Overview of international roaming security considerations and challenges"
759740
- videoId: "9bZkp7q19f0"
@@ -1186,9 +1167,9 @@ googleTagManager:
11861167
adsense:
11871168
publisherId: "ca-pub-9236847887178276"
11881169
slots:
1189-
banner: "1234567890"
1190-
inline: "0987654321"
1191-
sidebar: "1122334455"
1170+
banner: "2339988187"
1171+
inline: "9658933364"
1172+
sidebar: "9876228313"
11921173
footer: "2339988187"
11931174
enabled: true
11941175
frequency: "medium"

0 commit comments

Comments
 (0)