Mind Map of Security+ | Study Guide
Mind Map of Security+ | Study Guide
Security+ Study Guide Mind Map
Cybersecurity Fundamentals
CIA Triad
- Confidentiality
- Integrity
- Availability
DAD Triad
- Disclosure
- Alteration
- Denial
Key Concepts
- Non-repudiation
Threat Actors
- Black-hat Hackers
- Grey-hat Hackers
- White-hat Hackers
- Script Kiddies
- Hacktivists
- Organized Crime
- Nation-State Attackers
- Insider Threats
- Competitors
Attack Dynamics
- Attack Motivations
- Attack Surface
Vulnerabilities & Mitigations
Malware
- Spyware
- Ransomware
- IOCs (Indicators of Compromise)
- Trojans
- Worms
- Stuxnet
- Raspberry Robin
- Rootkits
- Bots/Botnets
- Bloatware
Password Attacks
- Brute Force
- Spraying
- Dictionary
- Rainbow Table
- Salting
Cryptographic Attacks
- Brute Force
- Dictionary
- Birthday
- Collision
- Downgrade
- Chosen Plaintext
- Related Key
- Frequency Analysis
Application Vulnerabilities
- Injection
- SQL
- Command
- Code
- XML
- Cross-Site Scripting (XSS)
- Reflected
- Stored
- Cross-Site Request Forgery (CSRF/XSRF)
- Insecure Direct Object Reference
- Race Condition
Physical Attacks
- Brute Force
- RFID Cloning
- Environmental
Mobile Device Vulnerabilities
- Side Loading
- Jailbreaking
Cryptography
Goals
- Confidentiality
- Integrity
- Authentication
- Nonrepudiation
Ciphers & Algorithms
- Stream Ciphers
- Caesar
- ROT13
- One-Time Pad
- Block Ciphers
- Transposition
- Rijndael (AES)
- Substitution Ciphers
- Polyalphabetic
- Vigenère
Symmetric Key Cryptography
- Algorithms
- DES
- 3DES
- AES (Rijndael)
- Key Exchange
- Limitations
Asymmetric Key Cryptography
- Algorithms
- RSA
- Elliptic Curve Cryptography (ECC)
- Public & Private Keys
- Digital Signatures
- Key Exchange
- Key Management
Hashing
- Algorithms
- MD5
- SHA
- SHA-1
- SHA-2
- SHA-3
- HMAC
- Salting
- Key Stretching
Digital Certificates
- Formats
- Certificate Authorities (CAs)
- Certificate Revocation List (CRLs)
- Online Certification Status Protocol (OCSP)
- Certificate Signing Request (CSR)
Advanced Topics
- Blockchain
- Steganography
Access Control
Schemes
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- SELinux
- AppArmor
- Role-Based Access Control (RBAC)
- Attribute-Based Access Control (ABAC)
- Rule-Based Access Control (RnBAC)
User Accounts
- Provisioning
- Deprovisioning
- Privileged Access management (PAM)
- Generic Accounts
- Guest Accounts
- Service Accounts
- Shared Accounts
Authentication
- Biometrics
- Passwords
- Multi-Factor Authentications (MFA)
- One-Time Passwords (OTP)
- Password less Authentication
- Kerberos
- RADIUS
- TACACS+
- SAML
- OAuth
Filesystem Permissions
- Linux
- Windows
💡 Join the discussion:
For questions or collaboration opportunities, visit our ZeroDayMindset Discussion Board
This post is licensed under CC BY 4.0 by the author.