From 9b1848d50472768cc590942392e01ae0405a634b Mon Sep 17 00:00:00 2001 From: b4haa7 <69992780+88BahaaAdel88@users.noreply.github.com> Date: Sun, 24 Nov 2024 05:07:02 +0200 Subject: [PATCH] Update resources for Authentication (#7745) * Update authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md replaced a wrong article with one about biometrics * Update understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md link redirects to a Thai gambling game site --- .../authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md | 2 +- ...derstand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md | 3 +-- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md b/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md index a9ac9b7a8..d9ea8deed 100644 --- a/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md +++ b/src/data/roadmaps/cyber-security/content/authentication-vs-authorization@WG7DdsxESm31VcLFfkVTz.md @@ -5,7 +5,7 @@ **Authorization** comes into play after the authentication process is complete. It involves granting or denying access to a resource, based on the authenticated user's privileges. Authorization determines what actions the authenticated user or entity is allowed to perform within a system or application. - [@article@Two-factor authentication (2FA)](https://authy.com/what-is-2fa/) -- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5428991/) +- [@article@Biometrics (fingerprint, facial recognition, etc.)](https://me-en.kaspersky.com/resource-center/definitions/biometrics) - [@article@Security tokens or certificates](https://www.comodo.com/e-commerce/ssl-certificates/certificate.php) - [@article@Role-based access control (RBAC)](https://en.wikipedia.org/wiki/Role-based_access_control) - [@article@Access Control Lists (ACLs)](https://en.wikipedia.org/wiki/Access-control_list) diff --git a/src/data/roadmaps/cyber-security/content/understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md b/src/data/roadmaps/cyber-security/content/understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md index ddf482013..dde03d8ec 100644 --- a/src/data/roadmaps/cyber-security/content/understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md +++ b/src/data/roadmaps/cyber-security/content/understand-common-exploit-frameworks@Lg7mz4zeCToEzZBFxYuaU.md @@ -6,5 +6,4 @@ Learn more from the following resources: - [@official@Metasploit Framework](https://www.metasploit.com/) - [@official@Core Impact](https://www.coresecurity.com/) -- [@official@Immunity Canvas](www.immunitysec.com) -- [@video@Metasploit for Beginners](https://www.youtube.com/watch?v=8lR27r8Y_ik) \ No newline at end of file +- [@video@Metasploit for Beginners](https://www.youtube.com/watch?v=8lR27r8Y_ik)