Articles on API security, server security and cyber security (#6001)

Add content links.

---------

Co-authored-by: dsh <daniel.s.holdsworth@gmail.com>
pull/6010/head
Subroto Banerjee 5 months ago committed by GitHub
parent 10ac77308d
commit a347c1739b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 1
      src/data/roadmaps/api-design/content/api-security@qIJ6dUppjAjOTA8eQbp0n.md
  2. 4
      src/data/roadmaps/backend/content/server-security@TZ0BWOENPv6pQm8qYB8Ow.md
  3. 1
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/100-cryptography/index.md

@ -6,3 +6,4 @@ Have a look at the following resources to understand API security and vulnerabil
- [@article@OWASP Project API Security](https://owasp.org/API-Security/editions/2023/en/0x00-toc/)
- [@feed@Explore top posts about Security](https://app.daily.dev/tags/security?ref=roadmapsh)
- [@article@How to Protect Data in Transit using HMAC and Diffie-Hellman in Node.js](https://www.freecodecamp.org/news/hmac-diffie-hellman-in-node/)

@ -11,3 +11,7 @@ Learn about the security of your server and how to secure it. Here are some of t
- Enable two-factor authentication: Two-factor authentication adds an extra layer of security to your accounts by requiring a second form of authentication, such as a code sent to your phone, in addition to your password.
Also learn about OpenSSL and creating your own PKI as well as managing certs, renewals, and mutual client auth with x509 certs
Learn more from the following resources:
- [@article@How to Defend Against Server-Side Request Forgery](https://www.freecodecamp.org/news/defending-against-ssrf-attacks/)

@ -33,4 +33,5 @@ Cryptanalysis is the process of attempting to break cryptographic systems, often
In conclusion, cryptography is a fundamental aspect of cyber security, offering a layer of protection for sensitive data in digital networks. To effectively implement cryptography in your organization, you should be familiar with the various types of cryptography, cryptographic protocols, and key management best practices, and understand the potential threats posed by cryptanalysis.
- [@article@Cryptography for Dummies (TryHackMe)](https://tryhackme.com/room/cryptographyfordummies)
- [@article@How to Protect Data in Transit using HMAC and Diffie-Hellman in Node.js](https://www.freecodecamp.org/news/hmac-diffie-hellman-in-node/)
- [@feed@Explore top posts about Cryptography](https://app.daily.dev/tags/cryptography?ref=roadmapsh)

Loading…
Cancel
Save