Cybersecurity is the art of protecting cyber assets from unauthorized use and the practice of ensuring the CIA triad of information.
https://www.cisa.gov/news-events/news/what-cybersecurity
Links to this note
- application whitelist
- authentication
- benchmark (cybersecurity)
- benign
- Bishop Fox
- black box
- black magic
- Bloodhound
- blue team
- borges2021
- buildingopensourcenetworksecuritytools-schiffman2003
- bypass (cybersecurity)
- capture the flag
- CIS benchmarks
- Cisco Talos
- Cyber Kill Chain
- cybersecurity professional
- dark arts
- data retention policy
- defense in depth
- detection
- EDR
- F3EAD
- fingerprint
- FX (hacker)
- hardening (cybersecurity)
- HD Moore
- honeypot
- hooks
- initial access
- injection
- IPS
- Kali Linux
- Kaspersky
- Kevin Mitnick
- living off the land
- MFA
- Mike Schiffman
- mimikatz
- NIDS
- nmap
- non-repudiation
- penetration testing
- post-exploitation
- postmortem report
- proxy
- purple team
- Red Team
- route
- Security BSides
- security research
- security researcher
- SHA256
- social engineering
- Sourcefire
- Splunk
- spoofing
- system monitoring software
- telemetry
- telnet, rlogin, ftp are insecure networking protcols, used broadly into the 00's
- threat actor
- threat hunting
- threat intelligence
- Tools Techniques and Procedures
- VirusTotal
- visibility
- Volatility
- VPN
- vulnerability scanning
- word list
- Yubico
- zombie