🔐 Cybersecurity

Threats, controls, and frameworks that keep everything else trustworthy.

Frameworks

  • MITRE ATT&CK
  • NIST CSF
  • ISO 27001
  • CIS Controls
  • Zero Trust Architecture

Defensive controls

  • Network segmentation → Segmentation
  • IDS / IPS (Suricata, Snort, Zeek)
  • SIEM (Splunk, Elastic, Sentinel, Wazuh)
  • EDR / XDR
  • WAF

Offensive / testing

  • Nmap
  • Burp Suite
  • Metasploit
  • CTFs

Cryptography

  • TLS / mTLS
  • PKI
  • Symmetric vs asymmetric
  • → see Encryption

Identity & Access


All Cybersecurity notes

TABLE WITHOUT ID file.link AS "Note", type AS "Type", tags AS "Tags"
FROM "07 - Cybersecurity"
WHERE type != "moc"
SORT file.name ASC