diff --git a/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md b/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md index b99455057..580ce0878 100644 --- a/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md +++ b/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md @@ -5,10 +5,12 @@ It does this by monitoring, filtering, collecting, normalizing, and correlating Organizations leverage SIEMs to monitor and thus identify, protect, and respond to potential threats in their environment. -For hands-on experience, you should consider setting up a SIEM in your own environment. A common stack widely used for various purposes across the industry is the ELK-stack. +For hands-on experience, you should consider setting up a SIEM in your own environment. There are some commercial tools that you can try out for free, and there are also open source alternatives, such as Wazuh or LevelBlue OSSIM (AlienVault). Visit the following resources to learn more: - [@article@Security 101: What is a SIEM? - Microsoft](https://www.microsoft.com/security/business/security-101/what-is-siem) -- [@article@Using the ELK stack for SIEM](https://logz.io/blog/elk-siem/) -- [@video@Build a powerful home SIEM](https://www.youtube.com/watch?v=2XLzMb9oZBI) +- [@video@SIEM Explained - Professor Messer](https://www.youtube.com/watch?v=JEcETdy5WxU) +- [@video@Wazuh | Open source SIEM](https://www.youtube.com/watch?v=3CaG2GI1kn0) +- [@video@Splunk | The Complete Beginner Tutorial](https://www.youtube.com/playlist?list=PLY2f3p7xyMiTUbUo0A_lBFEwj6KdH0nFy) +- [@video@Elastic Security | Build a powerful home SIEM](https://www.youtube.com/watch?v=2XLzMb9oZBI) diff --git a/src/data/roadmaps/cyber-security/content/smime@9rmDvycXFcsGOq3v-_ziD.md b/src/data/roadmaps/cyber-security/content/smime@9rmDvycXFcsGOq3v-_ziD.md index e69de29bb..cd61c1070 100644 --- a/src/data/roadmaps/cyber-security/content/smime@9rmDvycXFcsGOq3v-_ziD.md +++ b/src/data/roadmaps/cyber-security/content/smime@9rmDvycXFcsGOq3v-_ziD.md @@ -0,0 +1,19 @@ +# S/MIME + +**S/MIME** stands for Secure/Multipurpose Internet Mail Extensions, and it is a cryptographic protocol that enhances the security of business emails through encryption and digital signatures. It allows users to encrypt emails and digitally sign them to verify the sender’s identity. + +## Advantages of S/MIME + +- **Verification**: Confirms the sender’s identity. + +- **Confidentiality**: Protects the content from unauthorized access. + +- **Integrity**: Ensures the message has not been altered. + +- **Secure Data Transfer**: Safely transmits files like images, audio, videos, and documents. + +- **Non-repudiation**: Prevents the sender from denying the origin of the message. + +## How S/MIME Works + +S/MIME enables the transmission of non-ASCII data via the Secure Mail Transfer Protocol (SMTP). It securely sends various data files, including music, video, and images, using encryption. Data encrypted with a public key can only be decrypted by the recipient’s private key, ensuring secure end-to-end communication.