Skip to content

Commit

Permalink
Updated CySec
Browse files Browse the repository at this point in the history
  • Loading branch information
itspatkar committed Dec 1, 2024
1 parent 2f68c3a commit 1c97efb
Showing 1 changed file with 103 additions and 3 deletions.
106 changes: 103 additions & 3 deletions cysec.html
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,11 @@ <h3 class="title">Cyber Security</h3>
<div class="section-list">
<ul>
<li><a href="#cia">CIA Triad</a></li>
<li><a href="#risk">Risk Management</a></li>
<li><a href="#cryptography">Cryptography</a></li>
<li><a href="#encryption">Encryption</a></li>
<li><a href="#hash">Hashing</a></li>
<li><a href="#secops">Security Operations</a></li>
<li><a href="#incident_risk">Incident Respone & Risk Management</a></li>
<li><a href="#governance">Governance Elements</a></li>
</ul>
</div>
Expand Down Expand Up @@ -59,8 +63,102 @@ <h6>Non-Repudiation* :</h6>
</div>
</div>

<div class="sections" id="risk">
<h4 class="heading"># Risk Management</h4>
<div class="sections" id="cryptography">
<h4 class="heading"># Cryptography</h4>
<div class="content">
<p>Cryptography is the practice and study of techniques for securing communication and data from third parties. It involves the creation of mathematical algorithms and protocols that ensure confidentiality, integrity, authenticity, and non-repudiation of information.</p>
<ul>
<li>
<h6>Encryption :</h6>
<p>Encryption is the process of transforming readable plaintext into unreadable ciphertext to mask sensitive information from unauthorized users. Encryption is used to protect sensitive data from unauthorized access and data breaches.</p>
</li>
<li>
<h6>Decryption :</h6>
<p>The description is a reverse process of encryption, where ciphertext is transformed back into plaintext using a decryption key.</p>
</li>
<li>
<h6>Hashing :</h6>
<p>Hashing is a method of converting data (message, file, or password) into a fixed-size string of characters, which typically represents a "fingerprint" of the original data. This converted hash value is called digest. Hashes are used for data integrity checks, ensuring that data has not been altered.</p>
</li>
<li>
<h6>Digital Signature :</h6>
<p></p>
</li>
<li>
<h6>Public Key Infrastructure (PKI) :</h6>
<p></p>
</li>
</ul>
</div>
</div>

<div class="sections" id="encryption">
<h4 class="heading"># Encryption</h4>
<div class="content">
<p>Encryption is the process of transforming readable plaintext into unreadable ciphertext to mask sensitive information from unauthorized users. Encryption is used to protect sensitive data from unauthorized access and data breaches. Encryption works by using encryption algorithms to encrypt data into an indecipherable format. Only authorized parties with the right secret key, known as the decryption key, can decrypt the data.</p>
<ul class="justify">
<li><b>Plaintext :</b> Plaintext is the original, readable data or message in its unencrypted form. Its meaning or value is immediately accessible and usable by the end user (person or a process).</li>
<li><b>Ciphertext :</b> Ciphertext is the encrypted, unreadable data or message and is not interpretable without the decryption key.</li>
<li><b>Encryption Algorithm :</b> An encryption algorithm is a mathematical procedure used to transform data (plaintext) into an unreadable format (ciphertext). This transformation process is achieved using a set of rules and a cryptographic key.</li>
</ul>
<h6>Types of Encryption -</h6>
<ul class="justify">
<li><b>Symmetric Encryption :</b> In symmetric encryption, the same key is used for both encryption and decryption processes. Example: AES (Advanced Encryption Standard) and DES (Data Encryption Standard) </li>
<li><b>Asymmetric Encryption :</b> In asymmetric encryption, different keys are used for encryption and decryption: a public key for encryption and a private key for decryption. Example: RSA (Rivest-Shamir-Adleman)</li>
</ul>
</div>
</div>

<div class="sections" id="Hash">
<h4 class="heading"># Hashing</h4>
<div class="content">
<p>Hashing is a method of converting data (message, file, or password) into a fixed-size string of characters, which typically represents a "fingerprint" of the original data. This converted hash value is called digest. Hashes are used for data integrity checks, ensuring that data has not been altered. Hashing is often used in file fingerprinting and storing passwords securely. Instead of storing the password itself, systems store the hash of the password.</p>
<ul class="justify">
<li>The key property of a hash function is that it produces a fixed-size output for any size of input.</li>
<li>The same input will always produce the same hash value, and even a tiny change in input will generate drastically different hash values.</li>
<li>The hash is irreversible, that is, a one-way operation; one cannot reverse the process to retrieve the original input data from the hash value.</li>
<li>Example: MD5 (Message Digest Algorithm) and SHA (Secure Hash Algorithm).</li>
</ul>
<h5>Checksum :</h5>
<p>A checksum is a small-sized piece of data generated from a larger set of data, used for error detection in data transmission and storage. When the data is transmitted or stored, the checksum is sent or saved alongside it. A checksum is computed by applying a mathematical algorithm (e.g., CRC32, MD5, SHA-1) to the data. Checksum is used in error detection in file transfers, storage, and network protocols (e.g., CRC checks in network protocols like Ethernet or ZIP file integrity).</p>
<ul class="justify">
<li>Checksums are fast and efficient for detecting accidental data corruption but are not designed for security purposes; they don't provide a high level of protection against malicious tampering.</li>
<li>For data integrity and colision resistance, more robust and secure hashes are used.</li>
</ul>
</div>
</div>

<div class="sections" id="secops">
<h4 class="heading"># Security Operations</h4>
<div class="content">
<p>SecOps (Security Operations) is a crucial discipline in cybersecurity that focuses on the integration of security practices and IT operations to ensure the continuous protection, monitoring, and management of an organization's infrastructure, networks, and data.</p>
<h5>Logging and Monitoring :</h5>
<p>Logging refers to the practice of recording detailed information about events, processes, and actions that occur within a system or network.</p>
<ul class="justify">
<li>These records, called logs, provide a history of events and activities that can be used for troubleshooting, performance monitoring, security auditing, and incident response.</li>
<li>A log contains information such as user IDs, system activities, dates and times of key events, device and location identity, system and resource access attempts, system configurations, network traffic, and track or history of events.</li>
<li>A log should be stored separately from the system where it is generated.</li>
</ul>

<h5>Security Information and Event Management :</h5>
<p>Security Information and Event Management (SIEM) is a system or tool used to provide real-time monitoring, analysis, and response to security threats across an organization's IT infrastructure.</p>
<ul class="justify">
<li>SIEM tools collect, aggregate, and analyze data from various sources, such as security logs, network traffic, and endpoint devices, to detect potential security incidents, vulnerabilities, or breaches.</li>
<li>Characteristics of SIEM are log management, event correlation, and real-time monitoring; incident detection and alerts; reporting and compliance; and forensics and analysis.</li>
<li>Logs are the raw data generated by systems and provide detailed records of activities. And SIEM is a tool that aggregates, normalizes, and analyzes these logs in real-time to detect security threats, providing more advanced insights, automation, and compliance reporting.</li>
<li>While logs provide the foundational data, SIEM platforms use that data to enhance security monitoring and response, making SIEM an essential tool for managing and interpreting logs in the context of cybersecurity.</li>
</ul>

<h5>Intrusion Detection/Prevention Systems :</h5>
<p></p>
<ul class="justify">
<li></li>
</ul>
</div>
</div>

<div class="sections" id="incident_risk">
<h4 class="heading"># Incident Respone & Risk Management</h4>
<div class="content">
<p>Risk management in cybersecurity is the process of identifying, assessing, and mitigating risks to an organization's digital assets, systems, and information.</p>
<h6>Risk Management Terminology :</h6>
Expand All @@ -69,6 +167,8 @@ <h6>Risk Management Terminology :</h6>
<li><b>Vulnerability :</b> A vulnerability is a gap or weakness in those protection effort.</li>
<li><b>Threat :</b> A threat something or someone that aims to exploit a vulnerability to thwart protection efforts.</li>
</ul>
<h6>Rebundancy :</h6>
<p>Redundancy refers to the practice of implementing backup systems, processes, or components to ensure that critical functions continue to operate smoothly in the event of failures, attacks, or disasters. By incorporating redundant systems, data storage, and network paths, organizations can reduce the risk of downtime, data loss, and service interruptions caused by system failures, cyberattacks, or other disruptions.</p>
</div>
</div>

Expand Down

0 comments on commit 1c97efb

Please sign in to comment.