- Principles and Key Ideas
- Cyber Threats and Attacks
- Network Security
- Endpoint Security
- Application Security
- Logging and Monitoring
- Cryptography
- Hypervisor Security
- Active Directory
- Wireless Security
- IoT Security
- Authentication Security
- Virtualization Security
- Data Security
- Blockchain Security
- Zero Trust
- Miscellaneous
Cyber Defense
Contents
- Principles and Key Ideas
- Cyber Threats and Attacks
- Network Security
- Endpoint Security
- Application Security
- Logging and Monitoring
- Cryptography
- Hypervisor Security
- Active Directory
- Wireless Security
- IoT Security
- Authentication Security
- Virtualization Security
- Data Security
- Blockchain Security
- Zero Trust
- Miscellaneous
Cyber Defense #
In the age of the internet, cyber defense is more important than ever. There are a variety of ways to protect your computer and your data, and it is important to be aware of all of them. Firewalls, antivirus software, and strong passwords are all important tools in the fight against cybercrime. In addition to these technical measures, it is also important to be aware of the risks of clicking on links or opening attachments from unknown sources. These can be the gateway for malware and viruses to enter your system. Be cautious and stay safe online!
- Cybersecurity for pre-beginners
- A Short Introduction to the Major Cyber Disciplines
- Getting started with Security Operations Center SOC
- SOC Security Functions
- Defining Security Roles and Responsibilities
Principles and Key Ideas #
There are several cyber security principles that are important to consider when protecting your online information. The first principle is confidentiality, which refers to the need to keep information private and secure. This is important because if information is leaked, it can be used to exploit vulnerabilities or commit fraud. The second principle is integrity, which means that information should be accurate and reliable. This is important because if information is inaccurate, it can lead to incorrect decisions being made. The third principle is availability, which refers to the need to keep information accessible to those who need it.
- The CIA Triad: Keep Your Data Safe
- The Parkerian Hexad A More Complete Set of Information Security Elements
- The three A’s of security: Authentication, Authorization, and Accounting
- The Importance of Data Integrity in Information Security
Cyber Threats and Attacks #
Cyber threats are a type of risk that can arise from the use of technology. They can take many forms, including viruses, malware, phishing attacks, and denial-of-service attacks. Cyber threats can pose a significant risk to organizations, as they can lead to the loss of confidential information, damage to systems, and interruption of business operations. Cyber threats can also have a significant impact on individuals, as they can result in the loss of personal information, identity theft, and financial loss.
- Understand the Different Types of Cyber Security Threats
- Understand the Different Types of Hackers
- Threat Actors in Cyberspace
- The Attacker Mindset: The DAD Triad
- What are software backdoors?
- Don’t Let Rootkits Take Control
- What is Adware?
- Spyware: Collecting Data From Your System Without Your Knowledge or Consent
- Keep an Eye Out for Keyloggers - They May Be Hiding on Your Device!
- Think Your Passwords Are Safe? Think Again
- An Overview of Insider Threats and how to Defend Against them
- Advanced Persistent Threat Lifecycle
- Don’t be the Next Victim Understand the Attack Lifecycle
- What are Zero-Day Vulnerabilities and Who Uses Them?
- Social Engineering: Basic Principals, Attacks, Phases and Prevention
- Don’t Be Bait for Phishing Attacks!
- Cyber Kill Chain: Protect your System by Understanding the Attackers’ Methods
- Protect your Organization by Learning Common Cyber Attack Classifications
- Privilege Escalation: Don’t Let the Bad Guys Get Ahead
- Learn about the Different ways Malware can Infect your System
- Ransomware: Security Against Extortion
- Be Malware Aware: What are the Different Types of Malware?
- Don’t let a DoS Attack take you Down
- Watch out for these Visual Signs of Malware Infection!
- Be Aware of Person-in-the-Middle Attacks and take Steps to Prevent them
- Be Botnet and Zombie Aware for a Safer Internet!
- Stay Protected from Bluetooth Threats
Network Security #
Network security is a broad term that refers to the various measures taken to protect networked devices and systems from unauthorized access or damage. This can include measures taken to prevent data breaches, malware infections, and Denial of Service (DoS) attacks, among other threats. There are many different approaches to network security, and the specific measures taken will depend on the types of devices and systems that are being protected. In general, however, most network security measures can be classified into one of two categories: prevention and detection.
- Perimeter Security: Defend Your Network Against Malicious Attacks
- Secure Peer-to-Peer Networks
- How to Stop SMTP Open Relays
- Network Sniffing: the Good, the Bad, and the Ugly
- SNMP Versions and Security Levels
- Firewalls: Creating Trust Barriers to Stop External Threats
- Block Malicious Packets with Packet Filtering Firewalls
- Choose the Right Switch for a Secure Network
- Secure Multipurpose Internet Mail Extension SMIME
- Comparing Secure Sockets Layer (SSL) and Secure-HTTP (HTTP-S) Protocols
- Transport Layer Security (TLS): Encrypt Your Information for Safe Communication
- Keep Your Internal Network Secure From Attack With a DMZ Network
- Introduction to Honeypots, Honeynets, and Padded Cells
- IPSec is an Efficient Security Enhancement to TCP/IP
- Benefits of Sinkholing
- Content Filtering: Monitor User Activity to Identify Potential Risks
- Find the Right Vulnerability Scanner for your Organization’s Needs
- An Explanation of Knowledge and Behavior-Based Detection Within an IDS
- Vulnerability Scanners: Result Accuracies
- Stop Cyberattacks Before they Start with an Intrusion Detection System
- How do intrusion detection systems work?
- You’re Never Too Far From the Office With a VPN
- Low-security VPN solution: Point-to-Point Tunneling Protocol
- Server-Client Communication Security: Digital Certificates
- Site-to-Site VPN for Secure Connections Between Business Offices and Partners
- The Best Way to Decide if Bring Your Own Device (BYOD) is Right for Your Workplace
- The Advantages and Disadvantages of Proxy Servers
- SIEM: Security Made Easy
- The Right Type of Alert for the Right Result
Endpoint Security #
Endpoint security is a term that refers to the measures taken to protect the endpoint devices in a network from being compromised. These measures can include both hardware and software solutions, and they are designed to prevent unauthorized access to the devices and to the data they contain. The term “endpoint” refers to any device that has the potential to connect to a network, including computers, laptops, smartphones, and tablets. Endpoint security is therefore a critical part of overall network security. There are a number of different ways to secure endpoint devices, including the use of firewalls, anti-virus software, and encryption. In many cases, a combination of these methods is used to provide the most comprehensive protection possible.
- A Hotfix What Is It
- Introduction to Patching
- Secure Your Servers With Our Advice
- Secure Browsing 101
- How to Collect Information about a Microsoft Vulnerability
- Securing Windows: An Introduction to Windows Group Policy
- Keep Your Computer Updated for Improved Performance and Security
- Keep Your Security Posture Strong With Vulnerability Management
- Practical Windows Hardening: Security Templates
- Endpoint Protection Platform EPP What is it
- Windows Advanced Threat Protection
- Build a Safe Testing Environment for Suspicious Files and URL’s
- Keep your Operating System Secure by Protecting your File System
- What Security Elements are Crucial for Creating a Trusted Operating System OS
Application Security #
Application security refers to measures taken to secure applications from threats. These measures can include things like securing data inputs and outputs, implementing authentication and authorization controls, and protecting against common attacks like SQL injection. Application security is important because applications are often the target of attacks. By securing applications, we can help to prevent data breaches, ensure data integrity, and protect against other types of attacks.
- Keep Your Online Applications Safe With a Web Application Firewall (WAF)
- Choose the Right Application Control for your Organization with Whitelisting and Blacklisting
Logging and Monitoring #
Logging and monitoring are two essential tools for any system administrator. Logging allows you to track events and activity on your system, while monitoring provides real-time visibility into what is happening on your system. Logging is essential for understanding what has happened on your system in the past. By reviewing log files, you can track down issues and identify potential problems. Monitoring, on the other hand, gives you a real-time view of what is happening on your system. This can be invaluable for spotting issues as they are happening and taking corrective action. Both logging and monitoring are essential tools for any system administrator.
- Introduction to Syslog
- How to Install and Set up Sysmon for Windows Endpoint Devices
- Introduction to Event Logs in Windows
- An Example of Monitoring Methods
- Basic Steps to Network Baselining
Cryptography #
Cryptography is the practice of secure communication in the presence of third parties. Its origins date back to ancient times, when people first developed ways to encode messages to keep them private. Today, cryptography is used in a variety of applications, from secure communications to data security. Encryption is a key component of cryptography. It is a process of transforming readable data into an unreadable format, making it difficult for unauthorized parties to access the information. Encryption is used in a variety of settings, from ensuring the privacy of communications to protecting data at rest. The growth of cryptographic technology has been driven by the need for secure communication and data security. As the world becomes more connected, the need for strong cryptography will only continue to grow.
Concepts:
This section introduces fundamental concepts of cryptography, including the history of cryptography, symmetric-key cryptography, and public-key cryptography:
- Introduction to Cryptography and Block Cipher Modes
- Hashing Algorithms: The Quick and Easy Way to Verify Integrity and Authentication
- Introduction to RSA encryption
- Keep Your Secrets Safe With Cryptography and Steganography
- How Practical is Homomorphic Encryption?
Techniques:
- Hands-on with shared key encryption
- Hands On with Public Key Cryptography
- Hands-on with Hash Functions
Tools:
Hypervisor Security #
A hypervisor, also known as a virtual machine monitor, is a software program that creates and runs virtual machines (VMs). A hypervisor allows multiple operating systems (OSes) to share a single physical host computer. Each virtual machine has its own virtual hardware, including a virtual CPU, memory, storage, and network adapters. Hypervisor security is a critical concern for organizations that use this technology. A hypervisor can be thought of as a mini operating system that controls access to physical resources. If a hypervisor is compromised, an attacker could gain access to all the virtual machines running on that host, as well as the host itself.
Active Directory #
Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Active Directory is an authoritative source for identifying, authenticating, and authorizing all users and computers in a Windows domain network. AD is also a repository for other objects such as applications, devices, and services. Security is a primary concern for any organization that relies on Active Directory to manage its data and resources. AD security is achieved through a combination of security configuration, authentication, and authorization.
- An Introduction to Active Directory and how PowerShell can be used as a Security Auditor
- Kerberos Attack and Defense Techniques
Wireless Security #
Wireless security is the prevention of unauthorized access or damage to electronic data, whether in transit or stored locally. It includes both physical security measures to prevent tampering or theft, as well as logical security measures to prevent unauthorized access. Wireless security is a growing concern due to the increased use of wireless networks and devices. There are a variety of measures that can be taken to secure a wireless network. Physical security measures include the use of physical barriers such as walls or ceilings to block wireless signals, as well as the use of security devices such as locks or alarms. Logical security measures include the use of passwords, encryption, and other security protocols.
- Basic Wireless Technologies and an Example of their Exploits
- Securing Wireless Network-based IDPS (NIDPS)
- WPA3
- Wireless attacks
- Keep your Data Safe. Encrypt your Wireless Devices
IoT Security #
IoT security is a growing concern as more and more devices are connected to the internet. Hackers are finding new ways to exploit vulnerabilities in these devices, which can lead to serious consequences. For example, a hacker could gain control of a connected car and cause a crash, or could disable a home’s security system, leaving the occupants vulnerable to attack. There are a number of ways to improve IoT security, such as using strong encryption, ensuring that devices are properly configured and updated, and using security monitoring tools to detect and respond to threats.
Authentication Security #
Authentication security is the process of verifying the identity of a user or process. This is typically done through the use of a username and password, but can also involve other factors such as biometrics or tokens. The goal of authentication security is to ensure that only authorized users are able to access a given system or resource. There are a number of different approaches that can be used for authentication security. The most common is to use some form of credential, such as a username and password. This approach is often supplemented with additional factors, such as a one-time code generated by a token device or biometric data such as a fingerprint or iris scan.
- Basic Authentication Models
- An Insight into Multi Factor Authentication
- An Example of Authentication Attacks
- Preventing Security breaches using Two Factor authentication
- Get to Know the Features of Biometric Factors
- Biometric Readers and their Accuracy
- Identification and Authentication Methods: Kerberos
- Remote Access Authentication: PAP and CHAP
Virtualization Security #
Virtualization security is the process of securing a virtualized environment from unauthorized access and potential threats. This process includes creating and maintaining secure virtual machine images, as well as configuring security settings for the virtualized environment. Virtualization security is a critical component of securing data and systems in a virtualized environment. By creating and maintaining secure virtual machine images, as well as configuring security settings for the virtualized environment, organizations can protect their data and systems from unauthorized access and potential threats.
- Weighing the Risks and Benefits of Virtual Machines
- Implement Physical Security to Create a Safe and Secure Environment
- The Basics of Securing Workstations: Virtual
- The Basics of Securing Workstations: Physical
Data Security #
Data security is the practice of protecting electronic data from unauthorized access. Data security includes both physical security to prevent unauthorized access to data stored on devices, and logical security to prevent unauthorized access to data over networks. Data security is important because electronic data is often confidential and/or proprietary. Unauthorized access to data can lead to data breaches, which can result in the loss of confidential information, financial loss, and damage to reputation. There are a variety of data security measures that can be employed to protect data, including physical security measures such as security cameras and access control, and logical security measures such as firewalls and encryption.
- Safeguard your Data by Implementing Different Cyber Security Controls
- Data Loss Prevention: Keep your Data Safe - Part 1
- Data Loss Prevention: Keep your Data Safe - Part 2
- Who Are Data Stewards Why Does Data Stewardship Matter
- Data Stewards Improve Data Utilization with Fresh Approaches
- Securing Confidentiality of Data using the Bell-LaPadula Model
- The Biba Model: A comparison between Bell-laPadula
Blockchain Security #
The security of blockchain technology is of paramount importance. The decentralized nature of the technology means that there is no central point of failure that could be exploited by malicious actors. Furthermore, the immutable nature of the blockchain means that once data has been recorded on the blockchain, it cannot be altered or deleted.
Zero Trust #
Zero trust is a security model that requires strict verification of users before allowing them access to data or systems. In a zero trust security model, all users are treated as untrusted, regardless of whether they are inside or outside the network perimeter. This approach is designed to address the shortcomings of the traditional security perimeter, which assumes that all users inside the perimeter are trustworthy and all users outside the perimeter are untrusted.
Miscellaneous #
There are a number of articles that don’t fit into any specific category. These are known as miscellaneous articles.
- Hardware Security Module HSM
- User and Entity Behavior Analytics UEBA
- Stay Safe and Secure While Working Remotely
- The Importance of Security Training and Awareness
- An Overview of Due Diligence and Due Care in Cyber Security
- The Importance of Crowd-Sourced Security in Cybersecurity Landscape
- Security Orchestration Automation and Response (SOAR)
- Don’t be Fooled by Imitations Protect your Data from Evil Twin Attacks
- An Overview of Premise Systems and their Weaknesses
- Follow the Separation of Duties Principle for a Safer Organization
- Data Security Management: Keep your Data Safe and Sound
- Don’t Let a Corrupt BIOS Ruin your Computer. BIOS Security Helps Keep your Computer Safe
- SIM Cloning What is it
- Subscriber Identity Module SIM Swapping What is it
- The Application of Artificial Intelligence in the Field of Cybersecurity
- Embedded Systems Security
- Your Business Information System - Complete and Secure
- What is Personally Identifiable Information PII
- A Security Professional’s Guide to the Diamond Model
- What are ICS and SCADA and Why Must they be Secured?
- Formalize your Agreement with an MOU
- Access Controls: For a Secure Organization
- Choose the Right Security Control Type for the Job
Rate This Article
Thanks for reading: Cyber Computer Network Defense (CND), Sorry, my English is bad:)