From adfdd1eabefe1bbb1192c62255b3f753fafb640b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Andr=C3=A9=20Oliveira?= <53203742+andreluis-oliveira@users.noreply.github.com> Date: Thu, 25 Jul 2024 05:13:43 -0300 Subject: [PATCH] Update dns.md (#6223) * Update dns.md - Fix the YouTube video link error and update the video title. * Update understand-cia-triad.md --- .../cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md | 4 ++-- .../cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md | 4 ++-- .../content/understand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md b/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md index 0afedeef7..3c4b7cebe 100644 --- a/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md +++ b/src/data/roadmaps/cyber-security/content/dns@ORIdKG8H97VkBUYpiDtXf.md @@ -23,5 +23,5 @@ Some common DNS record types you might encounter include: As an essential part of the internet, the security and integrity of the DNS infrastructure are crucial. However, it's vulnerable to various types of cyber attacks, such as DNS cache poisoning, Distributed Denial of Service (DDoS) attacks, and DNS hijacking. Proper DNS security measures, such as DNSSEC (DNS Security Extensions) and monitoring unusual DNS traffic patterns, can help mitigate risks associated with these attacks. - [@article@DNS in detail (TryHackMe)](https://tryhackme.com/room/dnsindetail) -- [@video@DNS in 100 Seconds (YouTube)](https://www.youtube.com/watch?v=uvr9lhugayu) -- [@feed@Explore top posts about DNS](https://app.daily.dev/tags/dns?ref=roadmapsh) \ No newline at end of file +- [@video@DNS Explained in 100 Seconds (YouTube)](https://www.youtube.com/watch?v=UVR9lhUGAyU) +- [@feed@Explore top posts about DNS](https://app.daily.dev/tags/dns?ref=roadmapsh) diff --git a/src/data/roadmaps/cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md b/src/data/roadmaps/cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md index 0afedeef7..3c4b7cebe 100644 --- a/src/data/roadmaps/cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md +++ b/src/data/roadmaps/cyber-security/content/dns@r1IKvhpwg2umazLGlQZL1.md @@ -23,5 +23,5 @@ Some common DNS record types you might encounter include: As an essential part of the internet, the security and integrity of the DNS infrastructure are crucial. However, it's vulnerable to various types of cyber attacks, such as DNS cache poisoning, Distributed Denial of Service (DDoS) attacks, and DNS hijacking. Proper DNS security measures, such as DNSSEC (DNS Security Extensions) and monitoring unusual DNS traffic patterns, can help mitigate risks associated with these attacks. - [@article@DNS in detail (TryHackMe)](https://tryhackme.com/room/dnsindetail) -- [@video@DNS in 100 Seconds (YouTube)](https://www.youtube.com/watch?v=uvr9lhugayu) -- [@feed@Explore top posts about DNS](https://app.daily.dev/tags/dns?ref=roadmapsh) \ No newline at end of file +- [@video@DNS Explained in 100 Seconds (YouTube)](https://www.youtube.com/watch?v=UVR9lhUGAyU) +- [@feed@Explore top posts about DNS](https://app.daily.dev/tags/dns?ref=roadmapsh) diff --git a/src/data/roadmaps/cyber-security/content/understand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md b/src/data/roadmaps/cyber-security/content/understand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md index c2f05a0df..024d730a5 100644 --- a/src/data/roadmaps/cyber-security/content/understand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md +++ b/src/data/roadmaps/cyber-security/content/understand-cia-triad@uz6ELaLEu9U4fHVfnQiOa.md @@ -34,4 +34,4 @@ Availability ensures that systems and information are accessible and functional In summary, the CIA Triad is an essential aspect of cybersecurity, providing a clear framework to evaluate and implement security measures. By ensuring confidentiality, integrity, and availability, you create a robust and secure environment for your information and systems. -- [@article@What is the CIA Triad (Varonis)?](https://www.varonis.com/blog/cia-triad) \ No newline at end of file +- [@video@The CIA Triad - Professor Messer](https://www.youtube.com/watch?v=SBcDGb9l6yo)