IT Security 101
A collection of fundamental topics.
Gathered here are all of the articles related to IT security fundamentals.
As new posts are written, they will be archived here for quick access.
The site is new, so the collection is small. Check back for more.
-
The CIS Controls v8.1
In this installment, the author provides an overview of the CIS Controls v8.1.
-
Essential Cyber Hygiene
In this installment, the author provides a closer look at Implementation Group 1 (IG1) of the CIS Controls v8.1.
-
Vulnerabilities
In this installment, the author provides an overview of vulnerabilities and the CVSS.
-
Incident Response (IR)
In this installment, the author provides an overview of IR, the IR Lifecycle and IRPs.
-
Threats and Threat Actors
In this installment, the author provides an overview of threats and takes a look at threat actors.
-
APTs and their TTPs
In this installment, the author provides an overview of Advanced Persistent Threats (APTs) and their Tactics, Techniques and Procedures (TTPs).
-
Common Compliance Frameworks
In this installment, the author provides an overview of security and privacy compliance frameworks.
-
The Open Systems Interconnection (OSI) Model
In this installment, the author provides an overview of the Open Systems Interconnection (OSI) Model.
-
Malware
In this installment, the author provides an overview of malware in its many forms, and common defense practices.
-
Social Engineering
In this installment, the author provides an overview of social engineering methods.
-
Common Ports and Protocols
In this installment, the author provides an overview of common network ports and protocols.
-
The Structured Threat Information Expression (STIX) Standard
In this installment, the author provides an overview of The Structured Threat Information Expression (STIX) standard.
-
Data Loss Prevention (DLP)
In this installment, the author provides an overview of data loss prevention (DLP).
-
DKIM, SPF and DMARC
In this installment, the author provides an overview of DKIM, SPF and DMARC.
-
The OWASP Top 10 Web App Security Risks
In this installment, the author provides an overview of the OWASP Top 10 Web App Security Risks and common controls for mitigation.