From 321952ed821b8b154984f1d1a4ab8111c3f24b0c Mon Sep 17 00:00:00 2001 From: Kevin Date: Thu, 1 Aug 2024 11:58:49 +0200 Subject: [PATCH] Cyber security roadmap: Add content to empty nodes (#6314) * Add content to siem@c2kY3wZVFKZYxMARhLIwO.md * added content to empty nodes: smishing, tailgating, whishing(vishing), and whois --- .../content/siem@c2kY3wZVFKZYxMARhLIwO.md | 14 ++++++++++++++ .../content/smishing@d4U6Jq-CUB1nNN2OCFoum.md | 3 +++ .../content/tailgating@o-keJgF9hmifQ_hUD91iN.md | 3 +++ .../content/whishing@M65fCl72qlF0VTbGNT6du.md | 5 +++++ .../content/whois@-RnlvUltJ9IDtH0HEnMbN.md | 8 ++++++++ 5 files changed, 33 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md b/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md index e69de29bb..b99455057 100644 --- a/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md +++ b/src/data/roadmaps/cyber-security/content/siem@c2kY3wZVFKZYxMARhLIwO.md @@ -0,0 +1,14 @@ +# SIEM + +SIEM, short for Security Information and Event Manager, is a term used to describe tools that greatly increases visibility into a network or system. +It does this by monitoring, filtering, collecting, normalizing, and correlating vast amounts of data such as logs, and neatly presents it via an interface/dashboard. + +Organizations leverage SIEMs to monitor and thus identify, protect, and respond to potential threats in their environment. + +For hands-on experience, you should consider setting up a SIEM in your own environment. A common stack widely used for various purposes across the industry is the ELK-stack. + +Visit the following resources to learn more: + +- [@article@Security 101: What is a SIEM? - Microsoft](https://www.microsoft.com/security/business/security-101/what-is-siem) +- [@article@Using the ELK stack for SIEM](https://logz.io/blog/elk-siem/) +- [@video@Build a powerful home SIEM](https://www.youtube.com/watch?v=2XLzMb9oZBI) diff --git a/src/data/roadmaps/cyber-security/content/smishing@d4U6Jq-CUB1nNN2OCFoum.md b/src/data/roadmaps/cyber-security/content/smishing@d4U6Jq-CUB1nNN2OCFoum.md index e69de29bb..1ecbb19f4 100644 --- a/src/data/roadmaps/cyber-security/content/smishing@d4U6Jq-CUB1nNN2OCFoum.md +++ b/src/data/roadmaps/cyber-security/content/smishing@d4U6Jq-CUB1nNN2OCFoum.md @@ -0,0 +1,3 @@ +# Smishing + +SMS-phishing, or "smishing", is a type of social-engineering attack based on SMS, or text messages, to trick a victim into doing something to the benefit of the attacker, such as clicking on a malicious link or providing sensitive information. diff --git a/src/data/roadmaps/cyber-security/content/tailgating@o-keJgF9hmifQ_hUD91iN.md b/src/data/roadmaps/cyber-security/content/tailgating@o-keJgF9hmifQ_hUD91iN.md index e69de29bb..0af22b05b 100644 --- a/src/data/roadmaps/cyber-security/content/tailgating@o-keJgF9hmifQ_hUD91iN.md +++ b/src/data/roadmaps/cyber-security/content/tailgating@o-keJgF9hmifQ_hUD91iN.md @@ -0,0 +1,3 @@ +# Tailgating + +Tailgating is the act of getting access to a restricted area by simply following an authorized person. This is a common social engineering technique used by attackers to gain physical access to a building or a restricted area. The attacker waits for an authorized person to open the door and then follows them inside. This technique is effective because it is based on trust and the assumption that the attacker is an authorized person. diff --git a/src/data/roadmaps/cyber-security/content/whishing@M65fCl72qlF0VTbGNT6du.md b/src/data/roadmaps/cyber-security/content/whishing@M65fCl72qlF0VTbGNT6du.md index e69de29bb..3c2a40527 100644 --- a/src/data/roadmaps/cyber-security/content/whishing@M65fCl72qlF0VTbGNT6du.md +++ b/src/data/roadmaps/cyber-security/content/whishing@M65fCl72qlF0VTbGNT6du.md @@ -0,0 +1,5 @@ +# Whishing + +Social engineering attack involving voice, such as a phone call to trick a victim to do something to the benefit of the attacker. + +Derived from voice-phishing, or "vishing". diff --git a/src/data/roadmaps/cyber-security/content/whois@-RnlvUltJ9IDtH0HEnMbN.md b/src/data/roadmaps/cyber-security/content/whois@-RnlvUltJ9IDtH0HEnMbN.md index e69de29bb..74e534535 100644 --- a/src/data/roadmaps/cyber-security/content/whois@-RnlvUltJ9IDtH0HEnMbN.md +++ b/src/data/roadmaps/cyber-security/content/whois@-RnlvUltJ9IDtH0HEnMbN.md @@ -0,0 +1,8 @@ +# Whois + +Whois is a protocol that allows querying databases to obtain information about the owner of a domain name, an IP address, or an autonomous system number on the Internet. + +In the field of cyber security, Whois data is one of several components in passive reconnaissance and open-source intelligence(OSINT) gathering. + +- [@article@How to use the whois command on Linux](https://www.howtogeek.com/680086/how-to-use-the-whois-command-on-linux/) +- [@article@Whois lookup](https://www.whois.com/whois/)