From bb0df94afa43b6f7cb7ebca219488bffcf98bf19 Mon Sep 17 00:00:00 2001 From: Vedansh Date: Sat, 26 Apr 2025 13:43:05 +0530 Subject: [PATCH] fix: topic links and content (#8536) --- ...learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md | 3 ++- .../cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md | 2 +- .../cyber-security/content/linux@4frVcjYI1VlVU9hQgpwcT.md | 2 +- .../content/local-auth@vYvFuz7lAJXZ1vK_4999a.md | 3 +++ .../cyber-security/content/lolbas@10qbxX8DCrfyH7tgYexxQ.md | 2 +- .../cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md | 2 +- .../cyber-security/content/macos@dztwr-DSckggQbcNIi4_2.md | 3 +-- .../cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md | 2 +- .../content/memory-leak@nOND14t7ISgSH3zNpV3F8.md | 2 ++ .../cyber-security/content/mesh@PYeF15e7iVB9seFrrO7W6.md | 4 ++-- .../cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md | 2 +- .../cyber-security/content/nac-based@6oAzYfwsHQYNVbi7c2Tly.md | 2 +- .../cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md | 2 +- .../cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md | 1 + .../cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md | 2 +- .../cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md | 4 ++-- .../cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md | 3 +-- 17 files changed, 23 insertions(+), 18 deletions(-) diff --git a/src/data/roadmaps/cyber-security/content/learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md b/src/data/roadmaps/cyber-security/content/learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md index abac13777..e5e3117e8 100644 --- a/src/data/roadmaps/cyber-security/content/learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md +++ b/src/data/roadmaps/cyber-security/content/learn-how-malware-works-and-types@v7CD_sHqLWbm9ibXXESIK.md @@ -34,4 +34,5 @@ A rootkit is a type of malware designed to hide or obscure the presence of other Keyloggers are a type of malware that monitor and record users' keystrokes, allowing attackers to capture sensitive information, such as login credentials or financial information entered on a keyboard. -Understanding the different types of malware can help you better identify and protect against various cyber threats. As the cyber landscape continues to evolve, it's essential to stay informed about emerging malware and equip yourself with the necessary security skills and knowledge. +Learn more from the following resources: + diff --git a/src/data/roadmaps/cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md b/src/data/roadmaps/cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md index bcbfe0edb..37d81e395 100644 --- a/src/data/roadmaps/cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md +++ b/src/data/roadmaps/cyber-security/content/legal@C5bCIdPi0gGkY_r4qqoXZ.md @@ -4,5 +4,5 @@ A legal department within an organization is responsible for handling all legal Learn more from the following resources: -- [@article@Key functions of a legal team](https://uk.practicallaw.thomsonreuters.com/w-009-3932?transitionType=Default&contextData=(sc.Default)&firstPage=true) +- [@article@Key Functions of a Legal Team](https://uk.practicallaw.thomsonreuters.com/w-009-3932?transitionType=Default&contextData=(sc.Default)&firstPage=true) - [@article@The Legal Team’s Responsibility in Corporate Cybersecurity](https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/expert-insight-the-legal-teams-responsibility-in-corporate-cybersecurity/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/linux@4frVcjYI1VlVU9hQgpwcT.md b/src/data/roadmaps/cyber-security/content/linux@4frVcjYI1VlVU9hQgpwcT.md index 90c00b8dd..e341bb22a 100644 --- a/src/data/roadmaps/cyber-security/content/linux@4frVcjYI1VlVU9hQgpwcT.md +++ b/src/data/roadmaps/cyber-security/content/linux@4frVcjYI1VlVU9hQgpwcT.md @@ -4,7 +4,7 @@ Linux is an open-source, Unix-like operating system kernel first released by Lin Learn more from the following resources: -- [@roadmap@Linux Roadmap](https://roadmap.sh/linux) +- [@roadmap@Visit Linux Roadmap](https://roadmap.sh/linux) - [@article@Linux Commands Cheat Sheet](https://cdn.hostinger.com/tutorials/pdf/Linux-Commands-Cheat-Sheet.pdf) - [@course@Linux from scratch - Cisco](https://www.netacad.com/courses/os-it/ndg-linux-unhatched) - [@video@Linux in 100 Seconds](https://www.youtube.com/watch?v=rrB13utjYV4) diff --git a/src/data/roadmaps/cyber-security/content/local-auth@vYvFuz7lAJXZ1vK_4999a.md b/src/data/roadmaps/cyber-security/content/local-auth@vYvFuz7lAJXZ1vK_4999a.md index fb4ae3205..0d4ff433e 100644 --- a/src/data/roadmaps/cyber-security/content/local-auth@vYvFuz7lAJXZ1vK_4999a.md +++ b/src/data/roadmaps/cyber-security/content/local-auth@vYvFuz7lAJXZ1vK_4999a.md @@ -2,3 +2,6 @@ Local authentication refers to the process of verifying a user's identity on a specific device or system without relying on external servers or networks. It typically involves storing and checking credentials directly on the device itself. Common methods include username/password combinations, biometrics (fingerprint, face recognition), or PIN codes. Local authentication is often used for device access, offline applications, or as a fallback when network-based authentication is unavailable. While it offers quick access and works without internet connectivity, it can be less secure than centralized authentication systems and more challenging to manage across multiple devices. Local authentication is commonly used in personal devices, standalone systems, and scenarios where network-based authentication is impractical or unnecessary. +Learn more from the following resources: + +- [@article@Local authentication, registration, and other settings](https://learn.microsoft.com/en-us/power-pages/security/authentication/set-authentication-identity) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/lolbas@10qbxX8DCrfyH7tgYexxQ.md b/src/data/roadmaps/cyber-security/content/lolbas@10qbxX8DCrfyH7tgYexxQ.md index 779ccd1f7..a63b60309 100644 --- a/src/data/roadmaps/cyber-security/content/lolbas@10qbxX8DCrfyH7tgYexxQ.md +++ b/src/data/roadmaps/cyber-security/content/lolbas@10qbxX8DCrfyH7tgYexxQ.md @@ -4,6 +4,6 @@ Learn more from the following resources: -- [@official@LOLBAS project](https://lolbas-project.github.io/#) +- [@official@LOLBAS Project](https://lolbas-project.github.io/#) - [@article@Understanding the risks of LOLBAS in security](https://pentera.io/blog/the-lol-isnt-so-funny-when-it-bites-you-in-the-bas/) - [@video@LOLBAS T1105, MS Process Abuse](https://www.youtube.com/watch?v=fq2_VvAU29g) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md b/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md index 0402b583c..50aaf08dc 100644 --- a/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md +++ b/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md @@ -4,4 +4,4 @@ Learn more from the following resources: -- [@article@Understanding the loopback address and loopback interfaces](https://study-ccna.com/loopback-interface-loopback-address/) \ No newline at end of file +- [@article@Understanding the Loopback Address and Loopback Interfaces](https://study-ccna.com/loopback-interface-loopback-address/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/macos@dztwr-DSckggQbcNIi4_2.md b/src/data/roadmaps/cyber-security/content/macos@dztwr-DSckggQbcNIi4_2.md index 52294149a..298d66abc 100644 --- a/src/data/roadmaps/cyber-security/content/macos@dztwr-DSckggQbcNIi4_2.md +++ b/src/data/roadmaps/cyber-security/content/macos@dztwr-DSckggQbcNIi4_2.md @@ -4,6 +4,5 @@ Learn more from the following resources: -- [@official@MacOS Website](https://www.apple.com/uk/macos/macos-sequoia/) +- [@official@macOS](https://www.apple.com/macos/macos-sequoia/) - [@video@Mac Tutorial for Beginners 2024](https://www.youtube.com/watch?v=3jeeFc2Vo1U) - diff --git a/src/data/roadmaps/cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md b/src/data/roadmaps/cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md index 85958f6f7..5d71ccba1 100644 --- a/src/data/roadmaps/cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md +++ b/src/data/roadmaps/cyber-security/content/memdump@wspNQPmqWRjKoFm6x_bVw.md @@ -5,4 +5,4 @@ Learn more from the following resources: - [@official@memdump](https://www.kali.org/tools/memdump/) - +- [@opensource@memdump - Github](https://github.com/tchebb/memdump) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/memory-leak@nOND14t7ISgSH3zNpV3F8.md b/src/data/roadmaps/cyber-security/content/memory-leak@nOND14t7ISgSH3zNpV3F8.md index d019f1781..087125a93 100644 --- a/src/data/roadmaps/cyber-security/content/memory-leak@nOND14t7ISgSH3zNpV3F8.md +++ b/src/data/roadmaps/cyber-security/content/memory-leak@nOND14t7ISgSH3zNpV3F8.md @@ -2,5 +2,7 @@ A Memory Leak occurs when a computer program consumes memory but fails to release it back to the operating system after it is no longer needed. Over time, this can lead to reduced system performance, increased memory usage, and, in severe cases, the program or system may crash due to the exhaustion of available memory. +Learn more from the following resources: + - [@article@What are memory leaks?](https://learn.snyk.io/lesson/memory-leaks/) - [@video@What are memory leaks?](https://www.youtube.com/watch?v=00Kdpgl6fsY) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/mesh@PYeF15e7iVB9seFrrO7W6.md b/src/data/roadmaps/cyber-security/content/mesh@PYeF15e7iVB9seFrrO7W6.md index a2b53fb78..cfc758429 100644 --- a/src/data/roadmaps/cyber-security/content/mesh@PYeF15e7iVB9seFrrO7W6.md +++ b/src/data/roadmaps/cyber-security/content/mesh@PYeF15e7iVB9seFrrO7W6.md @@ -4,5 +4,5 @@ Mesh topology is a network architecture where devices or nodes are interconnecte Learn more from the following resources: -- [@article@What is mesh topology?](https://www.lenovo.com/gb/en/glossary/mesh-topology) -- [@article@Mesh topology explained](https://www.computerhope.com/jargon/m/mesh.htm) +- [@article@What is Mesh Topology?](https://www.lenovo.com/gb/en/glossary/mesh-topology) +- [@article@Mesh Topology explained](https://www.computerhope.com/jargon/m/mesh.htm) diff --git a/src/data/roadmaps/cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md b/src/data/roadmaps/cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md index 20dbc302f..41c55468e 100644 --- a/src/data/roadmaps/cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md +++ b/src/data/roadmaps/cyber-security/content/mitm@ODlVT6MhV-RVUbRMG0mHi.md @@ -4,4 +4,4 @@ A Man-in-the-Middle (MITM) attack occurs when a malicious actor intercepts commu Visit the following resources to learn more: -- [@article@Wikipedia - Man-in-the-middle attack](https://en.wikipedia.org/wiki/Man-in-the-middle_attack) \ No newline at end of file +- [@article@Man-in-the-middle attack](https://en.wikipedia.org/wiki/Man-in-the-middle_attack) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/nac-based@6oAzYfwsHQYNVbi7c2Tly.md b/src/data/roadmaps/cyber-security/content/nac-based@6oAzYfwsHQYNVbi7c2Tly.md index be1c840b3..fde4671cc 100644 --- a/src/data/roadmaps/cyber-security/content/nac-based@6oAzYfwsHQYNVbi7c2Tly.md +++ b/src/data/roadmaps/cyber-security/content/nac-based@6oAzYfwsHQYNVbi7c2Tly.md @@ -2,7 +2,7 @@ Network Access Control (NAC) based hardening is a crucial component in enhancing the security of your network infrastructure. NAC provides organizations with the ability to control and manage access to the network resources, ensuring that only authorized users and devices can connect to the network. It plays a vital role in reducing the attack surface and preventing unauthorized access to sensitive data and resources. By implementing NAC-based hardening in your cybersecurity strategy, you protect your organization from threats and maintain secure access to critical resources. -Learn more from the following resouces: +Learn more from the following resources: - [@video@Network Access Control](https://www.youtube.com/watch?v=hXeFJ05J4pQ) - [@article@What is Network Access Control](https://www.fortinet.com/resources/cyberglossary/what-is-network-access-control) diff --git a/src/data/roadmaps/cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md b/src/data/roadmaps/cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md index 820814dc3..b63b75257 100644 --- a/src/data/roadmaps/cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md +++ b/src/data/roadmaps/cyber-security/content/netflow@xXz-SwvXA2cLfdCd-hLtW.md @@ -4,5 +4,5 @@ Learn more from the following resources: -- [@official@Cisco NetFlow Website](https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html) +- [@official@Cisco NetFlow](https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html) - [@video@What is NetFlow?](https://www.youtube.com/watch?v=aqTpUmUibB8) diff --git a/src/data/roadmaps/cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md b/src/data/roadmaps/cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md index 007622b5d..1eabd4d69 100644 --- a/src/data/roadmaps/cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md +++ b/src/data/roadmaps/cyber-security/content/nids@LIPtxl_oKZRcbvXT4EdNf.md @@ -3,5 +3,6 @@ A Network Intrusion Detection System (NIDS) is a security solution designed to monitor and analyze network traffic for signs of suspicious activity or potential threats. NIDS operates by inspecting the data packets that flow through a network, looking for patterns that match known attack signatures or anomalies that could indicate malicious behavior. Unlike a Host Intrusion Detection System (HIDS), which focuses on individual host devices, NIDS provides a broader view by monitoring network traffic across multiple systems and devices. Visit the following resources to learn more: + - [@article@What is an Intrusion Detection System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids) - [@article@What is a Network Intrusion Detection system (NIDS)?](https://bunny.net/academy/security/what-is-network-intrusion-detection-nids/) diff --git a/src/data/roadmaps/cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md b/src/data/roadmaps/cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md index 65d056a9d..cea5062bf 100644 --- a/src/data/roadmaps/cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md +++ b/src/data/roadmaps/cyber-security/content/nist@SOkJUTd1NUKSwYMIprv4m.md @@ -4,5 +4,5 @@ Learn more from the following resources: -- [@official@NIST Website](https://www.nist.gov/) +- [@official@NIST](https://www.nist.gov/) - [@article@What is NIST?](https://www.encryptionconsulting.com/education-center/nist/) diff --git a/src/data/roadmaps/cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md b/src/data/roadmaps/cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md index 3b0120108..9718f3cc7 100644 --- a/src/data/roadmaps/cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md +++ b/src/data/roadmaps/cyber-security/content/nmap@Hoou7kWyfB2wx_yFHug_H.md @@ -4,6 +4,6 @@ Learn more from the following resources: -- [@official@NMAP Website](https://nmap.org/) +- [@official@NMAP](https://nmap.org/) - [@article@NMAP Cheat Sheet](https://www.tutorialspoint.com/nmap-cheat-sheet) -- [@video@Nmap Tutorial to find Network Vulnerabilities] +- [@video@Nmap Tutorial to find Network Vulnerabilities](https://www.youtube.com/watch?v=4t4kBkMsDbQ) diff --git a/src/data/roadmaps/cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md b/src/data/roadmaps/cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md index 51d2ade02..505b8cdbe 100644 --- a/src/data/roadmaps/cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md +++ b/src/data/roadmaps/cyber-security/content/ntp@tf0TymdPHbplDHvuVIIh4.md @@ -5,5 +5,4 @@ Learn more from the following resources: - [@video@Network Time Protocol (NTP)](https://www.youtube.com/watch?v=BAo5C2qbLq8) -- [@article@What is NTP?](https://www.pubnub.com/learn/glossary/ntp-protocol/) - +- [@article@What is NTP?](https://www.pubnub.com/learn/glossary/ntp-protocol/) \ No newline at end of file