Skip to content

Basics

# Cyber security: Focusing on protecting systems, networks, and data from cyber attacks. it deals primarily with digital assests.

Information security

focus on protecting information in any form - digital , physical, or verbal against unauthorized access, modification, or destruction. it cover all types of information, not just digital

Information security can be categorized into four major types based on strategic approaches:

1. Offensive Security (Attack & Ethical Hacking)

  • Focuses on actively testing and attacking systems to identify vulnerabilities before malicious hackers do.
  • Common practices:
    • Penetration Testing (Pentesting) – Simulating cyberattacks to find weaknesses.
    • Red Teaming – Adversarial attack simulations to test an organization’s detection and response.
    • Bug Bounty Programs – Rewarding security researchers for finding vulnerabilities.
    • Ethical Hacking – Using hacker techniques legally to improve security.
    • Social Engineering Attacks – Testing human security awareness (e.g., phishing tests).

2. Defensive Security (Protection & Mitigation)

  • Focuses on securing systems, detecting threats, and mitigating attacks.
  • Common practices:
    • Blue Teaming – Defending against attacks and responding to incidents.
    • Threat Detection & Response – Using tools like SIEM (Security Information and Event Management).
    • Endpoint Protection – Securing devices with EDR (Endpoint Detection and Response).
    • Firewalls & Intrusion Detection/Prevention Systems (IDS/IPS) – Blocking and monitoring threats.
    • Incident Response – Handling security breaches and minimizing damage.

3. Governance, Risk, and Compliance (GRC)

  • Ensures security aligns with business goals, legal requirements, and risk management.
  • Common areas:
    • Governance – Establishing security policies and frameworks (e.g., ISO 27001, NIST).
    • Risk Management – Identifying and mitigating security risks.
    • Compliance – Ensuring adherence to regulations (e.g., GDPR, HIPAA, SOC 2).
    • Security Audits & Assessments – Reviewing and improving security policies.

4. Security Protection & Architecture (Preventive Measures)

  • Focuses on designing and implementing security controls to prevent attacks.
  • Common practices:
    • Zero Trust Architecture – Enforcing strict access control, assuming no implicit trust.
    • Network Security – Segmentation, VPNs, firewalls, and intrusion prevention.
    • Data Security – Encryption, access control, and secure storage.
    • Identity & Access Management (IAM) – MFA, role-based access control.
    • Cloud Security – Securing cloud resources with tools like CSPM (Cloud Security Posture Management).

Table of contents

contents page
TERMS FOR CYBERSECURITY Cybersecurity Terms
SOC ANALYST Security Operations Center (SOC)
CYBERSECURITY TOOLS Cyber security tools
CONCEPTS ROADMAP Concepts roadmap

https://chatgpt.com/share/67ee7adf-a52c-8011-aae5-cb6fd6661c8c