From 107fa4842ca5f053436a882f4d82dd7f1db8214f Mon Sep 17 00:00:00 2001 From: Vedansh Date: Sat, 26 Apr 2025 17:36:51 +0530 Subject: [PATCH] cybersecurity: adjust few topic links (#8520) * adjust content in few topics. * Update src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md * Update antimalware@9QtY1hMJ7NKLFztYK-mHY.md --------- Co-authored-by: Arik Chakma --- .../content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md | 3 ++- .../content/antivirus@3140n5prZYySsuBHjqGOJ.md | 4 ++-- .../cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md | 2 +- .../cyber-security/content/arp@M52V7hmG4ORf4TIVw3W3J.md | 6 +++--- .../cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md | 3 ++- .../cyber-security/content/arp@hkO3Ga6KctKODr4gos6qX.md | 3 ++- ...authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md | 4 +++- .../cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md | 2 +- .../cyber-security/content/aws@0LztOTc3NG3OujCVwlcVU.md | 4 ++-- .../cyber-security/content/azure@GklBi7Qx1akN_cS9UMrha.md | 2 +- src/data/roadmaps/cyber-security/cyber-security.md | 2 -- 11 files changed, 19 insertions(+), 16 deletions(-) diff --git a/src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md b/src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md index 5b9347344..b9c2abb9e 100644 --- a/src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md +++ b/src/data/roadmaps/cyber-security/content/antimalware@9QtY1hMJ7NKLFztYK-mHY.md @@ -4,5 +4,6 @@ Anti-malware is a type of software designed to detect, prevent, and remove malic Learn more from the following resources: +- [@article@Anti-malware Definition](https://www.computertechreviews.com/definition/anti-malware/) - [@video@How Does Antivirus and Antimalware Software Work?](https://www.youtube.com/watch?v=bTU1jbVXlmM) -- [@article@What is antimalware?](https://riskxchange.co/1006974/cybersecurity-what-is-anti-malware/) \ No newline at end of file +- [@article@What is Antimalware?](https://riskxchange.co/1006974/cybersecurity-what-is-anti-malware/) diff --git a/src/data/roadmaps/cyber-security/content/antivirus@3140n5prZYySsuBHjqGOJ.md b/src/data/roadmaps/cyber-security/content/antivirus@3140n5prZYySsuBHjqGOJ.md index 128933e1d..fb8ee32b3 100644 --- a/src/data/roadmaps/cyber-security/content/antivirus@3140n5prZYySsuBHjqGOJ.md +++ b/src/data/roadmaps/cyber-security/content/antivirus@3140n5prZYySsuBHjqGOJ.md @@ -4,5 +4,5 @@ Antivirus software is a specialized program designed to detect, prevent, and rem Learn more from the following resources: -- [@video@What is an antivirus and how does it keep us safe?](https://www.youtube.com/watch?v=jW626WMWNAE) -- [@article@What is antivirus software?](https://www.webroot.com/gb/en/resources/tips-articles/what-is-anti-virus-software) \ No newline at end of file +- [@video@What is an Antivirus and how does it keep us safe?](https://www.youtube.com/watch?v=jW626WMWNAE) +- [@article@What is Antivirus Software?](https://www.webroot.com/gb/en/resources/tips-articles/what-is-anti-virus-software) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md b/src/data/roadmaps/cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md index f43c75583..8166e32b0 100644 --- a/src/data/roadmaps/cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md +++ b/src/data/roadmaps/cyber-security/content/anyrun@GZHFR43UzN0WIIxGKZOdX.md @@ -4,5 +4,5 @@ ANY.RUN is an interactive online malware analysis platform that allows users to Learn more from the following resources: -- [@official@ANY.RUN Website](https://any.run/) +- [@official@Any.run](https://any.run/) - [@video@Malware analysis with ANY.RUN](https://www.youtube.com/watch?v=QH_u7DHKzzI) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/arp@M52V7hmG4ORf4TIVw3W3J.md b/src/data/roadmaps/cyber-security/content/arp@M52V7hmG4ORf4TIVw3W3J.md index 250418c9c..42a51e4f0 100644 --- a/src/data/roadmaps/cyber-security/content/arp@M52V7hmG4ORf4TIVw3W3J.md +++ b/src/data/roadmaps/cyber-security/content/arp@M52V7hmG4ORf4TIVw3W3J.md @@ -6,8 +6,8 @@ When one device on a LAN wants to communicate with another, it needs to know the Once the requesting device receives the MAC address, it updates its ARP cache—a table that stores IP-to-MAC address mappings—allowing it to send data directly to the correct hardware address. +Learn more from the following resources: -Learn more from the following resources: - +- [@article@ARP - Wikipedia](https://en.wikipedia.org/wiki/Address_Resolution_Protocol) - [@video@ARP Explained](https://www.youtube.com/watch?v=cn8Zxh9bPio) -- [@article@What is Address Resolution Protocol?](https://www.fortinet.com/resources/cyberglossary/what-is-arp) +- [@article@What is Address Resolution Protocol?](https://www.fortinet.com/resources/cyberglossary/what-is-arp) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md b/src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md index 331fdb03c..7e2610bf2 100644 --- a/src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md +++ b/src/data/roadmaps/cyber-security/content/arp@fzdZF-nzIL69kaA7kwOCn.md @@ -2,7 +2,8 @@ ARP is a protocol used by the Internet Protocol (IP) to map an IP address to a physical address, also known as a Media Access Control (MAC) address. ARP is essential for routing data between devices in a Local Area Network (LAN) as it allows for the translation of IP addresses to specific hardware on the network. When a device wants to communicate with another device on the same LAN, it needs to determine the corresponding MAC address for the target IP address. ARP helps in this process by broadcasting an ARP request containing the target IP address. All devices within the broadcast domain receive this ARP request and compare the target IP address with their own IP address. If a match is found, the device with the matching IP address sends an ARP reply which contains its MAC address. The device that initiated the ARP request can now update its ARP cache (a table that stores IP-to-MAC mappings) with the new information, and then proceed to send data to the target's MAC address. -Learn more from the following resources: +Learn more from the following resources: +- [@article@ARP - Wikipedia](https://en.wikipedia.org/wiki/Address_Resolution_Protocol) - [@video@ARP Explained](https://www.youtube.com/watch?v=cn8Zxh9bPio) - [@article@What is Address Resolution Protocol?](https://www.fortinet.com/resources/cyberglossary/what-is-arp) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/arp@hkO3Ga6KctKODr4gos6qX.md b/src/data/roadmaps/cyber-security/content/arp@hkO3Ga6KctKODr4gos6qX.md index 331fdb03c..7e2610bf2 100644 --- a/src/data/roadmaps/cyber-security/content/arp@hkO3Ga6KctKODr4gos6qX.md +++ b/src/data/roadmaps/cyber-security/content/arp@hkO3Ga6KctKODr4gos6qX.md @@ -2,7 +2,8 @@ ARP is a protocol used by the Internet Protocol (IP) to map an IP address to a physical address, also known as a Media Access Control (MAC) address. ARP is essential for routing data between devices in a Local Area Network (LAN) as it allows for the translation of IP addresses to specific hardware on the network. When a device wants to communicate with another device on the same LAN, it needs to determine the corresponding MAC address for the target IP address. ARP helps in this process by broadcasting an ARP request containing the target IP address. All devices within the broadcast domain receive this ARP request and compare the target IP address with their own IP address. If a match is found, the device with the matching IP address sends an ARP reply which contains its MAC address. The device that initiated the ARP request can now update its ARP cache (a table that stores IP-to-MAC mappings) with the new information, and then proceed to send data to the target's MAC address. -Learn more from the following resources: +Learn more from the following resources: +- [@article@ARP - Wikipedia](https://en.wikipedia.org/wiki/Address_Resolution_Protocol) - [@video@ARP Explained](https://www.youtube.com/watch?v=cn8Zxh9bPio) - [@article@What is Address Resolution Protocol?](https://www.fortinet.com/resources/cyberglossary/what-is-arp) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md b/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md index d9ea8deed..12c24017f 100644 --- a/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md +++ b/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md @@ -1,9 +1,11 @@ -## Authentication vs Authorization +# Authentication vs Authorization **Authentication** is the process of validating the identity of a user, device, or system. It confirms that the entity attempting to access the resource is who or what they claim to be. The most common form of authentication is the use of usernames and passwords. Other methods include: **Authorization** comes into play after the authentication process is complete. It involves granting or denying access to a resource, based on the authenticated user's privileges. Authorization determines what actions the authenticated user or entity is allowed to perform within a system or application. +Learn more from the following resources: + - [@article@Two-factor authentication (2FA)](https://authy.com/what-is-2fa/) - [@article@Biometrics (fingerprint, facial recognition, etc.)](https://me-en.kaspersky.com/resource-center/definitions/biometrics) - [@article@Security tokens or certificates](https://www.comodo.com/e-commerce/ssl-certificates/certificate.php) diff --git a/src/data/roadmaps/cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md b/src/data/roadmaps/cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md index 81ab2af47..845a9419b 100644 --- a/src/data/roadmaps/cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md +++ b/src/data/roadmaps/cyber-security/content/autopsy@bIwpjIoxSUZloxDuQNpMu.md @@ -4,5 +4,5 @@ Autopsy is a versatile and powerful open-source digital forensics platform that Learn more from the following resources: -- [@official@Autopsy Website](https://www.autopsy.com/) +- [@official@Autopsy](https://www.autopsy.com/) - [@video@Disk analysis with Autopsy](https://www.youtube.com/watch?v=o6boK9dG-Lc&t=236s) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/aws@0LztOTc3NG3OujCVwlcVU.md b/src/data/roadmaps/cyber-security/content/aws@0LztOTc3NG3OujCVwlcVU.md index 702f106f6..fb5d5a631 100644 --- a/src/data/roadmaps/cyber-security/content/aws@0LztOTc3NG3OujCVwlcVU.md +++ b/src/data/roadmaps/cyber-security/content/aws@0LztOTc3NG3OujCVwlcVU.md @@ -4,8 +4,8 @@ Amazon Web Services (AWS) is a leading cloud computing platform provided by Amaz Learn more from the following resources: -- [@roadmap@AWS Roadmap](https://roadmap.sh/aws) -- [@official@AWS Website](https://aws.amazon.com) +- [@roadmap@Visit Dedicated AWS Roadmap](https://roadmap.sh/aws) +- [@official@AWS](https://aws.amazon.com) - [@article@How to create an AWS account](https://grapplingdev.com/tutorials/how-to-create-aws-account) - [@video@AWS Overview](https://www.youtube.com/watch?v=a9__D53WsUs) - [@course@AWS Complete Tutorial](https://www.youtube.com/watch?v=B8i49C8fC3E) diff --git a/src/data/roadmaps/cyber-security/content/azure@GklBi7Qx1akN_cS9UMrha.md b/src/data/roadmaps/cyber-security/content/azure@GklBi7Qx1akN_cS9UMrha.md index c1b8bbd4a..74e9b7d25 100644 --- a/src/data/roadmaps/cyber-security/content/azure@GklBi7Qx1akN_cS9UMrha.md +++ b/src/data/roadmaps/cyber-security/content/azure@GklBi7Qx1akN_cS9UMrha.md @@ -4,6 +4,6 @@ Azure is Microsoft's comprehensive cloud computing platform that offers a wide r Learn more from the following resources: -- [@official@Azure Website](https://azure.microsoft.com) +- [@official@Azure](https://azure.microsoft.com) - [@video@Azure DevOps Tutorial for Beginners](https://www.youtube.com/watch?v=4BibQ69MD8c) - [@feed@daily.dev Azure Feed](https://app.daily.dev/tags/azure) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/cyber-security.md b/src/data/roadmaps/cyber-security/cyber-security.md index c52b840bf..fa1c17fd4 100644 --- a/src/data/roadmaps/cyber-security/cyber-security.md +++ b/src/data/roadmaps/cyber-security/cyber-security.md @@ -28,7 +28,6 @@ seo: - 'cyber security skills' - 'guide to cyber security' - 'cyber security roadmap' - - 'cyber security skills' - 'cyber security skills test' - 'skills for cyber security' - 'what is cyber security' @@ -38,7 +37,6 @@ seo: - 'cyber security expert roadmap' - 'become a cyber security expert' - 'cyber security expert career path' - - 'cyber security expert' - 'modern cyber security expert' relatedRoadmaps: - 'backend'