Cybersecurity Terminology: A Comprehensive Guide to Understanding Key Concepts
-
Updated
Apr 28, 2023
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Cybersecurity Terminology: A Comprehensive Guide to Understanding Key Concepts
A script for Man-In-The-Middle to kill malicious TCP connections through RST segment.
My computer networking and cybersec blog.
MEng project to study the basics of certification and certificate chains.
Some Levels require designing script to get the password. Here is the reference to those levels.
Here are the Encyption and Decryption programs to various types of ciphers
The project aim to set up a new user friendly tool for parents or educational institution to keep unwanted website out of children's/student's accessibility.
My subdomain enumeration script. 7 ways
Decanter implements core cryptographic primitives in support of the scsys ecosystem
As a pentester, you may find yourself in a situation where you are asked to not use automated scanners. In these cases, port scanning by hand can be very useful. PortScanner is a tool that can help with this process.
tenable vulnerability diff - a pipeline utility leveraging tenable api to check you haven't introduced new vulnerabilities into your deployment.
Simulates the Cyber-Crime of Web Pharming where a legit website is copied and used by an attacker to fool people into believing that requests are Legitimate
A CTF style task for the SkillsUSA 2023 Regionals Cybersecurity competition.
All the features and services realized by the Response bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).
All the features and services realized by the security Audit bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).
this website is used for at the moment for testing Cross site scripting venerability's
Binary Exploitation CTF
whole-pinging tool to test IPs
Created by The cybersecurity community