add bluetooth security resources from norton us and bluetooth officia… (#5490)

* add bluetooth security resources from norton us and bluetooth official website

* add video to basics of computer networking for cybersecurity roadmap

* add Linux Commands Cheat Sheet

Added Linux Commands Cheat Sheet to 101-linux.md

* add virtual machine explanation from abhishek veeramalla's devops zero to hero course
pull/5579/head
Ata Tekeli 6 months ago committed by GitHub
parent c72dd0081c
commit 5a910b53e6
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 3
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/102-bluetooth.md
  2. 3
      src/data/roadmaps/cyber-security/content/100-basic-it-skills/104-basics-of-computer-networking.md
  3. 3
      src/data/roadmaps/cyber-security/content/101-operating-systems/101-linux.md
  4. 2
      src/data/roadmaps/cyber-security/content/102-networking-knowledge/110-virutalization-basics/101-vm.md

@ -15,3 +15,6 @@ Below are some key points about Bluetooth:
- **Potential vulnerabilities**: Despite its built-in security measures, Bluetooth is not immune to cyber attacks. Some common risks include "bluejacking" (unauthorized sending of messages or files), "bluesnarfing" (unauthorized access to device data), and "BlueBorne" (an attack vector that exploits Bluetooth connections to infiltrate devices and spread malware). Users should be cautious in their usage of Bluetooth and follow best practices like not accepting unknown connection requests and turning off Bluetooth when not in use. - **Potential vulnerabilities**: Despite its built-in security measures, Bluetooth is not immune to cyber attacks. Some common risks include "bluejacking" (unauthorized sending of messages or files), "bluesnarfing" (unauthorized access to device data), and "BlueBorne" (an attack vector that exploits Bluetooth connections to infiltrate devices and spread malware). Users should be cautious in their usage of Bluetooth and follow best practices like not accepting unknown connection requests and turning off Bluetooth when not in use.
In conclusion, Bluetooth offers a convenient means of connecting devices wirelessly. While it provides reasonably secure communication, users must stay informed about potential vulnerabilities and follow good security practices to safeguard their devices. In conclusion, Bluetooth offers a convenient means of connecting devices wirelessly. While it provides reasonably secure communication, users must stay informed about potential vulnerabilities and follow good security practices to safeguard their devices.
- [Bluetooth security risks to know (and how to avoid them)](https://us.norton.com/blog/mobile/bluetooth-security)
- [Bluetooth security best practices from official website](https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/)

@ -51,4 +51,5 @@ The Open Systems Interconnection (OSI) model is a conceptual framework used to u
Mastering the basics of computer networking is key to understanding and implementing effective cyber security measures. This chapter has covered essential networking concepts, but it is important to continually expand your knowledge in this ever-evolving field. Mastering the basics of computer networking is key to understanding and implementing effective cyber security measures. This chapter has covered essential networking concepts, but it is important to continually expand your knowledge in this ever-evolving field.
- [What is Computer Networking?](https://tryhackme.com/room/whatisnetworking) - [What is Computer Networking?](https://tryhackme.com/room/whatisnetworking)
- [Learn Networking in 3 hours (basics for cybersecurity and DevOps)](https://www.youtube.com/watch?v=iSOfkw_YyOU&t=1549s)

@ -33,4 +33,5 @@ While Linux is inherently secure, there are best practices to enhance your syste
By understanding Linux's features and best practices, you can leverage its powerful capabilities and robust security features to enhance your computing environment's performance and safety. By understanding Linux's features and best practices, you can leverage its powerful capabilities and robust security features to enhance your computing environment's performance and safety.
- [Learn Linux](https://linuxjourney.com/) - [Learn Linux](https://linuxjourney.com/)
- [Introduction to Linux](https://youtu.be/sWbUDq4S6Y8) - [Introduction to Linux](https://youtu.be/sWbUDq4S6Y8)
- [Linux Commands Cheat Sheet](https://cdn.hostinger.com/tutorials/pdf/Linux-Commands-Cheat-Sheet.pdf?_ga=2.100546909.2114439087.1713515209-1230351550.1713515209)

@ -39,3 +39,5 @@ There is a wide range of virtualization software available, including:
- Oracle VM VirtualBox: A Type 2 hypervisor that runs on Windows, macOS, and Linux hosts, popular for desktop virtualization. - Oracle VM VirtualBox: A Type 2 hypervisor that runs on Windows, macOS, and Linux hosts, popular for desktop virtualization.
In conclusion, virtual machines play a critical role in modern computing, providing a flexible and efficient method to optimize computing resources, isolate applications, and enhance security. Understanding VMs and virtualization technology is an essential part of any comprehensive cybersecurity guide. In conclusion, virtual machines play a critical role in modern computing, providing a flexible and efficient method to optimize computing resources, isolate applications, and enhance security. Understanding VMs and virtualization technology is an essential part of any comprehensive cybersecurity guide.
[Virtual Machines Part-1 by Abhishek Veeramalla](https://www.youtube.com/watch?v=lgUwYwBozow)

Loading…
Cancel
Save