Illustration of a teacup with tea leaves, drops, and a shield, symbolizing natural health protection.

IT Security 101

A collection of fundamental topics.

Gathered here are all of the articles related to IT security fundamentals.
As new posts are written, they will be archived here for quick access.
The site is new, so the collection is small. Check back for more.

  • Knights in armor with shields and swords standing in front of a glowing futuristic server or data center, symbolizing cybersecurity protection.

    The CIS Controls v8.1

    In this installment, the author provides an overview of the CIS Controls v8.1.

  • Illustration of people surrounding and working on a castle rendered as a tech network. Participants with computers, ladders, and cables are connecting and interacting with the castle's turrets. The scene conveys a mix of medieval architecture and modern technology.

    Essential Cyber Hygiene

    In this installment, the author provides a closer look at Implementation Group 1 (IG1) of the CIS Controls v8.1.

  • Illustration of a digital bug with binary code on its body over a colorful circuit board background.

    Vulnerabilities

    In this installment, the author provides an overview of vulnerabilities and the CVSS.

  • Illustration of people working at desks and computers, surrounded by digital icons and tech symbols.

    Incident Response (IR)

    In this installment, the author provides an overview of IR, the IR Lifecycle and IRPs.

  • Illustration of seven progressively larger and more complex robots standing in a line, each featuring detailed mechanical designs with armor and weapons.

    Threats and Threat Actors

    In this installment, the author provides an overview of threats and takes a look at threat actors.

  • Cartoon ninjas attacking computer servers.

    APTs and their TTPs

    In this installment, the author provides an overview of Advanced Persistent Threats (APTs) and their Tactics, Techniques and Procedures (TTPs).

  • Common Compliance Frameworks

    In this installment, the author provides an overview of security and privacy compliance frameworks.

  • The Open Systems Interconnection (OSI) Model

    In this installment, the author provides an overview of the Open Systems Interconnection (OSI) Model.

  • Malware

    In this installment, the author provides an overview of malware in its many forms, and common defense practices.

  • Social Engineering

    In this installment, the author provides an overview of social engineering methods.

  • Common Ports and Protocols

    In this installment, the author provides an overview of common network ports and protocols.

  • The Structured Threat Information Expression (STIX) Standard

    In this installment, the author provides an overview of The Structured Threat Information Expression (STIX) standard.

  • Data Loss Prevention (DLP)

    In this installment, the author provides an overview of data loss prevention (DLP).

  • DKIM, SPF and DMARC

    In this installment, the author provides an overview of DKIM, SPF and DMARC.

  • The OWASP Top 10 Web App Security Risks

    In this installment, the author provides an overview of the OWASP Top 10 Web App Security Risks and common controls for mitigation.