From ed3c5eef7c50f65d05301c3666793083fdb93167 Mon Sep 17 00:00:00 2001 From: Kamran Ahmed Date: Wed, 9 Nov 2022 14:01:20 +0400 Subject: [PATCH] Add security content in computer science --- .../119-security/100-public-key-cryptography.md | 9 ++++++++- .../119-security/101-hashing-encryption-encoding.md | 11 ++++++++++- .../content/119-security/102-hashing-algorithms.md | 9 ++++++++- .../content/119-security/103-owasp-top-10.md | 10 +++++++++- .../content/119-security/readme.md | 13 ++++++++++++- .../content/108-security/100-hashing-algorithms.md | 9 ++++++++- 6 files changed, 55 insertions(+), 6 deletions(-) diff --git a/content/roadmaps/103-computer-science/content/119-security/100-public-key-cryptography.md b/content/roadmaps/103-computer-science/content/119-security/100-public-key-cryptography.md index 40bdb476a..88b5af40a 100644 --- a/content/roadmaps/103-computer-science/content/119-security/100-public-key-cryptography.md +++ b/content/roadmaps/103-computer-science/content/119-security/100-public-key-cryptography.md @@ -1 +1,8 @@ -# Public key cryptography \ No newline at end of file +# Public Key Cryptography + +Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. + +Free Content +Public-key cryptography - Wikipedia +Public Key Cryptography - Computerphile +Public Key Cryptography: RSA Encryption Algorithm diff --git a/content/roadmaps/103-computer-science/content/119-security/101-hashing-encryption-encoding.md b/content/roadmaps/103-computer-science/content/119-security/101-hashing-encryption-encoding.md index 71cc17467..5951bf2f7 100644 --- a/content/roadmaps/103-computer-science/content/119-security/101-hashing-encryption-encoding.md +++ b/content/roadmaps/103-computer-science/content/119-security/101-hashing-encryption-encoding.md @@ -1 +1,10 @@ -# Hashing encryption encoding \ No newline at end of file +# Hashing/Ecncryption/Encoding + +Hashing is a one-way function that takes an input and produces a fixed-length output. The output is called a hash. The hash is a unique representation of the input. The hash is deterministic, meaning that the same input will always produce the same hash. The hash is irreversible, meaning that it is impossible to go from the hash back to the original input. The hash is collision-resistant, meaning that it is impossible to find two different inputs that produce the same hash. + +Encryption is a two-way function that takes an input and produces an output. The output is called ciphertext. The ciphertext is a unique representation of the input. The ciphertext is deterministic, meaning that the same input will always produce the same ciphertext. The ciphertext is reversible, meaning that it is possible to go from the ciphertext back to the original input. The ciphertext is collision-resistant, meaning that it is impossible to find two different inputs that produce the same ciphertext. + +Encoding is a two-way function that takes an input and produces an output. The output is called encoded text. The encoded text is a unique representation of the input. The encoded text is deterministic, meaning that the same input will always produce the same encoded text. The encoded text is reversible, meaning that it is possible to go from the encoded text back to the original input. The encoded text is not collision-resistant, meaning that it is possible to find two different inputs that produce the same encoded text. + +Free Content +Encoding, Encryption and Hashing -- What's the Difference? diff --git a/content/roadmaps/103-computer-science/content/119-security/102-hashing-algorithms.md b/content/roadmaps/103-computer-science/content/119-security/102-hashing-algorithms.md index 1d9e5c8fc..57efdd011 100644 --- a/content/roadmaps/103-computer-science/content/119-security/102-hashing-algorithms.md +++ b/content/roadmaps/103-computer-science/content/119-security/102-hashing-algorithms.md @@ -1 +1,8 @@ -# Hashing algorithms \ No newline at end of file +# Hashing Algorithms + +Hashing algorithms are used to generate a unique value for a given input. This value is called a hash. Hashing algorithms are used to verify the integrity of data, to store passwords, and to generate unique identifiers for data. + +Free Content +Hashing Algorithms and Security - Computerphile +Top Hashing Algorithms In Cryptography | MD5 and SHA 256 Algorithms Expalined | Simplilearn +SHA: Secure Hashing Algorithm - Computerphile diff --git a/content/roadmaps/103-computer-science/content/119-security/103-owasp-top-10.md b/content/roadmaps/103-computer-science/content/119-security/103-owasp-top-10.md index b24fd9e78..78864e413 100644 --- a/content/roadmaps/103-computer-science/content/119-security/103-owasp-top-10.md +++ b/content/roadmaps/103-computer-science/content/119-security/103-owasp-top-10.md @@ -1 +1,9 @@ -# Owasp top 10 \ No newline at end of file +# OWASP + +OWASP or Open Web Application Security Project is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. + +Free Content +Wikipedia - OWASP +OWASP Web Application Security Testing Checklist +OWASP Top 10 Security Risks +OWASP Cheatsheets diff --git a/content/roadmaps/103-computer-science/content/119-security/readme.md b/content/roadmaps/103-computer-science/content/119-security/readme.md index f76df344c..139515145 100644 --- a/content/roadmaps/103-computer-science/content/119-security/readme.md +++ b/content/roadmaps/103-computer-science/content/119-security/readme.md @@ -1 +1,12 @@ -# Security \ No newline at end of file +# Security + +Web security refers to the protective measures taken by the developers to protect the web applications from threats that could affect the business. + +Free Content +MIT 6.858 Computer Systems Security, Fall 2014 +Why HTTPS Matters +Wikipedia - OWASP +OWASP Web Application Security Testing Checklist +OWASP Top 10 Security Risks +OWASP Cheatsheets +Content Security Policy (CSP) diff --git a/content/roadmaps/114-software-architect/content/108-security/100-hashing-algorithms.md b/content/roadmaps/114-software-architect/content/108-security/100-hashing-algorithms.md index 1d9e5c8fc..57efdd011 100644 --- a/content/roadmaps/114-software-architect/content/108-security/100-hashing-algorithms.md +++ b/content/roadmaps/114-software-architect/content/108-security/100-hashing-algorithms.md @@ -1 +1,8 @@ -# Hashing algorithms \ No newline at end of file +# Hashing Algorithms + +Hashing algorithms are used to generate a unique value for a given input. This value is called a hash. Hashing algorithms are used to verify the integrity of data, to store passwords, and to generate unique identifiers for data. + +Free Content +Hashing Algorithms and Security - Computerphile +Top Hashing Algorithms In Cryptography | MD5 and SHA 256 Algorithms Expalined | Simplilearn +SHA: Secure Hashing Algorithm - Computerphile