From d3ccfb9cedaef08ee8486c3cfe3da6b5c50c53f3 Mon Sep 17 00:00:00 2001 From: Vedansh Date: Sun, 20 Apr 2025 22:42:57 +0530 Subject: [PATCH] refactor(cyber-security): adjust content for cyber securities (#8521) --- .../cyber-security/content/bash@tao0Bb_JR0Ubl62HO8plp.md | 1 + ...and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md | 4 ++-- .../content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md | 3 ++- .../basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md | 3 ++- ...cs-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md | 2 +- .../blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md | 7 ++++--- .../cyber-security/content/box@4Man3Bd-ySLFlAdxbLOHw.md | 2 +- .../brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md | 6 +++--- .../content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md | 1 + .../cyber-security/content/bus@0DWh4WmLK_ENDuqQmQcu4.md | 5 +++-- 10 files changed, 20 insertions(+), 14 deletions(-) diff --git a/src/data/roadmaps/cyber-security/content/bash@tao0Bb_JR0Ubl62HO8plp.md b/src/data/roadmaps/cyber-security/content/bash@tao0Bb_JR0Ubl62HO8plp.md index 128889152..6d1889bf7 100644 --- a/src/data/roadmaps/cyber-security/content/bash@tao0Bb_JR0Ubl62HO8plp.md +++ b/src/data/roadmaps/cyber-security/content/bash@tao0Bb_JR0Ubl62HO8plp.md @@ -4,6 +4,7 @@ Bash (Bourne Again Shell) is a widely-used Unix shell and scripting language tha Learn more from the following resources: +- [@official@Bash](https://www.gnu.org/software/bash/) - [@video@Bash in 100 Seconds](https://www.youtube.com/watch?v=I4EWvMFj37g) - [@course@Beginners Guide To The Bash Terminal](https://www.youtube.com/watch?v=oxuRxtrO2Ag) - [@course@Start learning bash](https://linuxhandbook.com/bash/) diff --git a/src/data/roadmaps/cyber-security/content/basics-and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md b/src/data/roadmaps/cyber-security/content/basics-and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md index 22e0c7a97..90747a916 100644 --- a/src/data/roadmaps/cyber-security/content/basics-and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md +++ b/src/data/roadmaps/cyber-security/content/basics-and-concepts-of-threat-hunting@_x3BgX93N-Pt1_JK7wk0p.md @@ -2,8 +2,8 @@ Threat hunting is a proactive approach to cybersecurity where security professionals actively search for hidden threats or adversaries that may have bypassed traditional security measures, such as firewalls and intrusion detection systems. Rather than waiting for automated tools to flag suspicious activity, threat hunters use a combination of human intuition, threat intelligence, and advanced analysis techniques to identify indicators of compromise (IoCs) and potential threats within a network or system. The process involves several key concepts, starting with a **hypothesis**, where a hunter develops a theory about potential vulnerabilities or attack vectors that could be exploited. They then conduct a **search** through logs, traffic data, or endpoint activity to look for anomalies or patterns that may indicate malicious behavior. **Data analysis** is central to threat hunting, as hunters analyze vast amounts of network and system data to uncover subtle signs of attacks or compromises. If threats are found, the findings lead to **detection and mitigation**, allowing the security team to contain the threat, remove malicious entities, and prevent similar incidents in the future. - Learn more from the following resources: - [@article@What is Threat Hunting](https://www.ibm.com/topics/threat-hunting) -- [@video@Cyber Security Threat Hunting explained](https://www.youtube.com/watch?v=VNp35Uw_bSM) \ No newline at end of file +- [@article@What is Threat Hunting? Threat Hunting Types and Techniques](https://www.fortinet.com/resources/cyberglossary/threat-hunting) +- [@video@Cyber Security Threat Hunting Explained](https://www.youtube.com/watch?v=VNp35Uw_bSM) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md b/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md index de9472929..77d3dc49d 100644 --- a/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md +++ b/src/data/roadmaps/cyber-security/content/basics-of-ids-and-ips@FJsEBOFexbDyAj86XWBCc.md @@ -8,9 +8,10 @@ An Intrusion Detection System (IDS) is a critical security tool designed to moni ## What is Intrusion Prevention System (IPS)? -An Intrusion Prevention System (IPS) is an advanced security solution closely related to IDS. While an IDS mainly focuses on detecting and alerting about intrusions, an IPS takes it a step further and actively works to prevent the attacks. It monitors, analyzes, and takes pre-configured automatic actions based on suspicious activities, such as blocking malicious traffic, reseting connections, or dropping malicious packets. +An Intrusion Prevention System (IPS) is an advanced security solution closely related to IDS. While an IDS mainly focuses on detecting and alerting about intrusions, an IPS takes it a step further and actively works to prevent the attacks. It monitors, analyzes, and takes pre-configured automatic actions based on suspicious activities, such as blocking malicious traffic, resetting connections, or dropping malicious packets. Learn more from the following resources: - [@video@Intrusion Prevention System (IPS)](https://www.youtube.com/watch?v=7QuYupuic3Q) - [@article@What is an Intrusion Prevention System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips) +- [@article@What is Intrusion Detection Systems (IDS)](https://www.fortinet.com/resources/cyberglossary/intrusion-detection-system) diff --git a/src/data/roadmaps/cyber-security/content/basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md b/src/data/roadmaps/cyber-security/content/basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md index 5984988cf..fd03e1d9a 100644 --- a/src/data/roadmaps/cyber-security/content/basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md +++ b/src/data/roadmaps/cyber-security/content/basics-of-threat-intel-osint@wN5x5pY53B8d0yopa1z8F.md @@ -4,5 +4,6 @@ Threat Intelligence (Threat Intel) and Open-Source Intelligence (OSINT) are both Learn more from the following resources: -- [@article@OSINT Framework](https://osintframework.com/) +- [@official@OSINT Framework](https://osintframework.com/) +- [@article@Threat Intelligence](https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/) - [@course@Open-Source Intelligence (OSINT) in 5 Hours](https://www.youtube.com/watch?v=qwA6MmbeGNo&t=457s) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/basics-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md b/src/data/roadmaps/cyber-security/content/basics-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md index d7123d417..f7629b922 100644 --- a/src/data/roadmaps/cyber-security/content/basics-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md +++ b/src/data/roadmaps/cyber-security/content/basics-of-vulnerability-management@lcxAXtO6LoGd85nOFnLo8.md @@ -8,6 +8,6 @@ Next, **remediation** is carried out through patching, configuration changes, or Learn more from the following resources: -- [@article@What is vulnerability management? - Rapid7](https://www.rapid7.com/fundamentals/vulnerability-management-and-scanning/) +- [@article@What is Vulnerability Management? - Rapid7](https://www.rapid7.com/fundamentals/vulnerability-management-and-scanning/) - [@article@What is Vulnerability Management? - CrowdStrike](https://www.crowdstrike.com/cybersecurity-101/vulnerability-management/) - [@video@Vulnerability Management explained by experts](https://www.youtube.com/watch?v=RE6_Lo2wSIg) diff --git a/src/data/roadmaps/cyber-security/content/blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md b/src/data/roadmaps/cyber-security/content/blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md index 3f982087d..00d80dd26 100644 --- a/src/data/roadmaps/cyber-security/content/blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md +++ b/src/data/roadmaps/cyber-security/content/blue--red--purple-teams@7tDxTcKJNAUxbHLPCnPFO.md @@ -4,6 +4,7 @@ In the context of cybersecurity, Blue Team, Red Team, and Purple Team are terms Learn more from the following resources: -- [@article@What is a blue team?](https://www.checkpoint.com/cyber-hub/cyber-security/what-is-a-blue-team/) -- [@article@What is red teaming?](https://www.ibm.com/think/topics/red-teaming) -- [@article@Purple teaming explained](https://www.crowdstrike.com/cybersecurity-101/purple-teaming/) +- [@article@What is a Blue Team?](https://www.checkpoint.com/cyber-hub/cyber-security/what-is-a-blue-team/) +- [@article@What is Red Teaming?](https://www.ibm.com/think/topics/red-teaming) +- [@article@Purple Teaming Explained](https://www.crowdstrike.com/cybersecurity-101/purple-teaming/) +- [@article@Red Team VS Blue Team: What's the Difference?](https://www.crowdstrike.com/en-us/cybersecurity-101/advisory-services/red-team-vs-blue-team/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/box@4Man3Bd-ySLFlAdxbLOHw.md b/src/data/roadmaps/cyber-security/content/box@4Man3Bd-ySLFlAdxbLOHw.md index 59ea77e20..e086abb68 100644 --- a/src/data/roadmaps/cyber-security/content/box@4Man3Bd-ySLFlAdxbLOHw.md +++ b/src/data/roadmaps/cyber-security/content/box@4Man3Bd-ySLFlAdxbLOHw.md @@ -4,5 +4,5 @@ Box is a popular cloud storage service that provides individuals and businesses Learn more from the following resources: -- [@official@Box Website](https://www.box.com/en-gb/home) +- [@official@Box](https://www.box.com/en-gb/home) - [@video@Box Cloud Storage Review 2024](https://www.youtube.com/watch?v=ktNDLO1T96c) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md b/src/data/roadmaps/cyber-security/content/brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md index effcb605e..8c49c2e63 100644 --- a/src/data/roadmaps/cyber-security/content/brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md +++ b/src/data/roadmaps/cyber-security/content/brute-force-vs-password-spray@Q0i-plPQkb_NIvOQBVaDd.md @@ -10,6 +10,6 @@ Password Spray is a more targeted and stealthy method of password cracking where Visit the following resources to learn more: -- [@article@Brute force vs. Password Spray attack](https://www.inspark.nl/brute-force-vs-password-spray-attack-in-azure-sentinel/) -- [@article@What is password spraying?](https://www.techtarget.com/whatis/definition/password-spraying) -- [@article@What is a brute force attack?](https://www.fortinet.com/resources/cyberglossary/brute-force-attack) +- [@article@Brute-force vs. Password Spray Attack](https://www.inspark.nl/brute-force-vs-password-spray-attack-in-azure-sentinel/) +- [@article@What is Password Spraying?](https://www.techtarget.com/whatis/definition/password-spraying) +- [@article@What is a Brute-force Attack?](https://www.fortinet.com/resources/cyberglossary/brute-force-attack) diff --git a/src/data/roadmaps/cyber-security/content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md b/src/data/roadmaps/cyber-security/content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md index 6a50f620a..9e7c1f57b 100644 --- a/src/data/roadmaps/cyber-security/content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md +++ b/src/data/roadmaps/cyber-security/content/buffer-overflow@n8ZOZxNhlnw7DpzoXe_f_.md @@ -6,3 +6,4 @@ Visit the following resources to learn more: - [@article@What Is Buffer Overflow?](https://www.fortinet.com/resources/cyberglossary/buffer-overflow) - [@article@Buffer Overflow Attack](https://www.imperva.com/learn/application-security/buffer-overflow/) +- [@video@Buffer Overflows Made Easy](https://www.youtube.com/watch?v=qSnPayW6F7U) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/bus@0DWh4WmLK_ENDuqQmQcu4.md b/src/data/roadmaps/cyber-security/content/bus@0DWh4WmLK_ENDuqQmQcu4.md index 22eac2c39..34b9e9308 100644 --- a/src/data/roadmaps/cyber-security/content/bus@0DWh4WmLK_ENDuqQmQcu4.md +++ b/src/data/roadmaps/cyber-security/content/bus@0DWh4WmLK_ENDuqQmQcu4.md @@ -4,5 +4,6 @@ In the context of cybersecurity, a bus refers to a communication system that tra Learn more from the following resources: -- [@article@What is a bus?](https://www.lenovo.com/gb/en/glossary/bus/?srsltid=AfmBOoocoXVvqdupLu13XAm0FZMOHjRtjnnCCFxa59tEa-bQwhiVhac2) -- [@video@Computer buses](https://www.youtube.com/watch?v=aBCaCrC3z0k) \ No newline at end of file +- [@article@Bus in Computing](https://en.wikipedia.org/wiki/Bus_(computing)) +- [@article@What is a Bus?](https://www.lenovo.com/gb/en/glossary/bus/?srsltid=AfmBOoocoXVvqdupLu13XAm0FZMOHjRtjnnCCFxa59tEa-bQwhiVhac2) +- [@video@Computer Buses](https://www.youtube.com/watch?v=aBCaCrC3z0k) \ No newline at end of file