Basics
# Cyber security: Focusing on protecting systems, networks, and data from cyber attacks. it deals primarily with digital assests.
Information security¶
focus on protecting information in any form - digital , physical, or verbal against unauthorized access, modification, or destruction. it cover all types of information, not just digital
Information security can be categorized into four major types based on strategic approaches:¶
1. Offensive Security (Attack & Ethical Hacking)¶
- Focuses on actively testing and attacking systems to identify vulnerabilities before malicious hackers do.
- Common practices:
- Penetration Testing (Pentesting) – Simulating cyberattacks to find weaknesses.
- Red Teaming – Adversarial attack simulations to test an organization’s detection and response.
- Bug Bounty Programs – Rewarding security researchers for finding vulnerabilities.
- Ethical Hacking – Using hacker techniques legally to improve security.
- Social Engineering Attacks – Testing human security awareness (e.g., phishing tests).
2. Defensive Security (Protection & Mitigation)¶
- Focuses on securing systems, detecting threats, and mitigating attacks.
- Common practices:
- Blue Teaming – Defending against attacks and responding to incidents.
- Threat Detection & Response – Using tools like SIEM (Security Information and Event Management).
- Endpoint Protection – Securing devices with EDR (Endpoint Detection and Response).
- Firewalls & Intrusion Detection/Prevention Systems (IDS/IPS) – Blocking and monitoring threats.
- Incident Response – Handling security breaches and minimizing damage.
3. Governance, Risk, and Compliance (GRC)¶
- Ensures security aligns with business goals, legal requirements, and risk management.
- Common areas:
- Governance – Establishing security policies and frameworks (e.g., ISO 27001, NIST).
- Risk Management – Identifying and mitigating security risks.
- Compliance – Ensuring adherence to regulations (e.g., GDPR, HIPAA, SOC 2).
- Security Audits & Assessments – Reviewing and improving security policies.
4. Security Protection & Architecture (Preventive Measures)¶
- Focuses on designing and implementing security controls to prevent attacks.
- Common practices:
- Zero Trust Architecture – Enforcing strict access control, assuming no implicit trust.
- Network Security – Segmentation, VPNs, firewalls, and intrusion prevention.
- Data Security – Encryption, access control, and secure storage.
- Identity & Access Management (IAM) – MFA, role-based access control.
- Cloud Security – Securing cloud resources with tools like CSPM (Cloud Security Posture Management).
Table of contents¶
| contents | page |
|---|---|
| TERMS FOR CYBERSECURITY | Cybersecurity Terms |
| SOC ANALYST | Security Operations Center (SOC) |
| CYBERSECURITY TOOLS | Cyber security tools |
| CONCEPTS ROADMAP | Concepts roadmap |
https://chatgpt.com/share/67ee7adf-a52c-8011-aae5-cb6fd6661c8c