Welcome to My personal CyberSecurity Notes! This repository is a curated collection of concepts
, explanations
, real-world examples
, and best practices
related to cybersecurity
.
- Please read the DISCLAIMER.md before using or referencing this content.
-
Governance
:- Managing and directing an organisation or system to achieve its objectives and ensure compliance with laws, regulations, and standards.
-
Regulation
:- A rule or law enforced by a governing body to ensure compliance and protect against harm.
-
Compliance
:- The state of adhering to laws, regulations, and standards that apply to an organisation or system.
-
Cybersecurity governance is the
framework
used by organizations to manage and direct their security efforts. It ensures that:-
Cybersecurity aligns with business goals
-
Risks are identified and managed
-
Policies, roles, and responsibilities are clearly defined
-
Legal and regulatory compliance is maintained
-
Component | Description |
---|---|
Policies & Standards |
Define how the organization protects data and systems (e.g., password policies, encryption standards). |
Risk Management |
Identifies, assesses, and prioritizes cybersecurity risks. |
Roles & Responsibilities |
Assigns responsibilities (CISO, IT Admin, Security Analyst, etc.). |
Monitoring & Reporting |
Ensures continuous oversight and improvement of security controls. |
Incident Response Plan |
Guides how to respond to cyber incidents effectively. |
Law/Framework | Purpose |
---|---|
GDPR (EU ) |
General Data Protection Regulation: Protects personal data and privacy of EU citizens. Heavy fines for data breaches. |
HIPAA (USA ) |
Protects health information in the healthcare sector. |
PCI-DSS |
For organizations handling credit card data (banks, payment processors). |
NIST Framework (USA ) |
National Institute of Standards and Technology: A security guideline followed by government and private companies. |
Law/Policy | Description |
---|---|
IT Act 2000 |
Main cyber law in India. Covers hacking, identity theft, cyber terrorism, etc. |
CERT-In Guidelines (2022 ) |
Indian Computer Emergency Response Team mandates breach reporting within 6 hours. |
Data Protection Act (2023 ) |
Aims to safeguard personal data and privacy of Indian citizens (inspired by GDPR). |
Digital India Initiatives |
Promotes cybersecurity in e-Governance, digital banking, and Aadhaar systems. |
-
Let’s say
"SecureBank Ltd."
is a digital bank in India. -
👨‍💼
Governance
:-
The
CISO
sets a policy: All customer data must be encrypted and stored in India. -
A risk assessment shows their mobile app backend is vulnerable.
-
Security team is assigned responsibility to fix it within 30 days.
-
-
📜
Regulation
:-
They follow
CERT-In rules
and must report any data breach within6 hours
. -
They must comply with
Data Protection Act 2023
ensuring customers can delete or correct their data. -
Their credit card processing must meet
PCI-DSS standards
.
-
Tool/Framework | Usage |
---|---|
ISO/IEC 27001 |
International standard for managing information security |
NIST CSF |
Risk management and cybersecurity best practices |
COBIT |
Governance framework for IT management |
SOC 2 |
Audit standard for service providers handling data |
-
Cybersecurity governance
= Strategy + policies + roles for secure operations. -
Regulation
= Laws enforced by governments to protect user data and systems. -
Real-world organizations must follow both internal policies (governance) and external laws (regulation).
-
Non-compliance can result in
hefty fines
,loss of reputation
, or evenlegal action
.
-
The
Cyber Kill Chain
— a concept developed byLockheed Martin
in2011
. -
The
Cyber Kill Chain
is aframework
that outlines the steps adversaries follow to launch and execute acyberattack
. It helps defenders identify and stop attackers at various stages.
-
What happens
:- The attacker gathers information about the target organization (
OSINT
,social media
,employee info
,tech stack
)
- The attacker gathers information about the target organization (
-
Real-World Example
:-
Attacker searches for examplecorp.com on:
-
LinkedIn (employee names, job titles)
-
Shodan (open servers and devices)
-
Google Dork:
site:examplecorp.com filetype:pdf
-
Finds exposed
PDF documents
withemployee emails
andinternal IPs
.
-
-
Defender Tip
: Monitor for unauthorized scanning and public exposure of internal docs.
-
What happens
:- The attacker crafts a
weaponized payload
using an exploit + a backdoor or malware.
- The attacker crafts a
-
Real-World Example
:- Attacker creates a malicious
PDF file
that uses an old Adobe Reader vulnerability to run a reverse shell.
- Attacker creates a malicious
-
Defender Tip
: Usesandboxing
andantivirus
to detect crafted payloads before they execute.
-
What happens
: -
The attacker delivers the payload via:
-
Email (phishing)
-
USB drops
-
Malicious websites
-
Drive-by downloads
-
-
Real-World Example
:-
A
phishing email
is sent to an employee pretending to be HR with a subject:"Salary Hike Details - March 2025"
-
Attached
PDF
has the exploit fromStep 2
.
-
-
Defender Tip
: Train employees to recognize phishing. Use email filters and spam protection.
-
What happens
:- Once the victim opens the payload, the exploit runs and executes the attacker's code.
-
Real-World Example
:-
Employee opens the malicious
PDF
. -
Exploit triggers
, runs areverse shell
: -
Attacker gets
low-privileged access
to theuser’s system
.
-
-
Defender Tip
: Keep software patched. Useendpoint detection
(EDR
).
-
What happens
:- Attacker installs
malware
(backdoor
,keylogger
,trojan
) to maintain access.
- Attacker installs
-
Real-World Example
:- Attacker installs
Cobalt Strike Beacon
orNetcat listener
forpersistence
:
nc -nlvp 4444
- Attacker installs
-
Defender Tip
: Monitorregistry changes
,startup scripts
, and usebehavior-based detection
.
-
What happens
:- The attacker establishes communication with the victim's system to send commands and receive stolen data.
-
Real-World Example
:-
Infected system pings a remote
C2
server every 10 seconds via HTTP. -
Attacker sends command to
escalate privileges
ordownload more malware
.
-
-
Defender Tip
: Monitoroutbound traffic
for connections tounusual domains
orIPs
.
-
What happens
: -
Attacker performs the intended objective:
-
Data theft
-
Destroy systems
-
Ransomware attack
-
Lateral movement
-
-
Real-World Example
:-
Attacker uses stolen credentials to access the
finance department server
. -
Exfiltrates
payroll data and sends to external server.
-
-
Defender Tip
: Use fileintegrity monitoring
,DLP systems
, androle-based access control
.
Stage | Attacker's Action | Real-World Example | Defense |
---|---|---|---|
1. Reconnaissance |
Gather info |
Google , LinkedIn , Shodan |
OSINT monitoring |
2. Weaponization |
Create payload |
Malicious PDF with exploit |
Sandbox , signature detection |
3. Delivery |
Send payload |
Phishing email |
Email filters , training |
4. Exploitation |
Trigger exploit |
PDF opens reverse shell |
Patching , EDR |
5. Installation |
Install malware |
Cobalt Strike beacon |
Behavior detection |
6. Command & Control |
Remote control |
C2 via HTTP to attacker server |
Monitor outbound traffic |
7. Actions on Objectives |
Final impact |
Data exfiltration |
DLP , logging , SIEM |
-
Attacker identifies target
John@company.com
on LinkedIn (Recon
). -
Crafts a PDF with an exploit and backdoor (
Weaponization
). -
Sends a phishing email (
Delivery
). -
John opens it, exploit runs (
Exploitation
). -
Malware installs, persists (
Installation
). -
Machine connects to attacker’s C2 server (
C2
). -
Attacker steals sensitive internal financial reports (
Objectives
).
-
What is it?
-
A foundational model for ensuring information security. It stands for:
-
C
onfidentiality -
I
ntegrity -
A
vailability
-
-
Real-World Examples
:
Principle | Meaning | Example |
---|---|---|
Confidentiality |
Only authorized people can access data | Bank encrypts your account details; attacker cannot read your ATM PIN |
Integrity |
Data should not be tampered with | Tamper-proof logs in a healthcare system; no one can alter patient records |
Availability |
Systems/data should be accessible when needed | Google services (Gmail, Drive) must be available 24/7; DDOS protection ensures this |
-
While
CIA
is from thedefender’s side
,DAD
is from theattacker’s view
:-
D
isclosure (breaking confidentiality
) -
A
lteration (breaking integrity
) -
D
estruction/D
enial (breaking availability
)
-
-
Example
:-
Attacker
leaks passwords
→Disclosure
-
Modifies
a company invoice →Alteration
-
Launches
DDoS
on a website →Denial
-
-
What is it?
-
A layered security strategy where multiple controls are in place so if one fails, others still protect the system.
-
Real-World Example
:-
Let’s say you're protecting a data center:
-
Physical Security
–Security guards
,keycards
-
Network Security
–Firewalls
,IDS
/IPS
-
System Security
–Antivirus
,EDR tools
-
Access Control
–Role-based access
-
Encryption
–For stored and transmitted data
-
Monitoring
–SIEM
,alert systems
-
-
Even if an attacker breaks in at one level, other levels still stop or detect the threat.
- Security models are theoretical frameworks used to design secure systems
Model | Focus | Real-Life Example |
---|---|---|
Bell-LaPadula |
Confidentiality only | Military systems where data classification matters (Top Secret, Secret, Confidential) |
Biba Model |
Integrity | Medical databases to prevent doctors from altering lab results |
Clark-Wilson |
Commercial integrity | Banking systems ensuring only approved transactions are allowed |
Brewer-Nash (Cinderella Model) |
Prevent conflict of interest | Legal firms can't let lawyers access two competing client cases |
-
What is it?
-
This standard defines
five architectural design principles
for secure systems:-
Security Policy Enforcement
-
Security Function Isolation
-
Least Privilege
-
Secure Defaults
-
Open Design
-
-
Example
: -
A
banking app
following these principles:-
Gives minimum access to each user role (e.g., teller vs manager)
-
Logs every transaction (Policy Enforcement)
-
Runs critical functions in isolated containers (Isolation)
-
-
Trust but Verify
(Old Model
):- Once you’re inside the network, you're
trusted
.
- Once you’re inside the network, you're
-
Example
:Employee connects to company Wi-Fi
→Gets access to file servers without re-authentication
.
-
Problem
: If attacker gains internal access, they can move laterally without being stopped. -
Zero Trust
(Modern Model
): -
“Never trust, always verify.”
-
Even inside the network, you must authenticate and authorize every time.
-
Real-World Example
:Google
usesBeyondCorp
(Zero Trust model
).
-
If you access
Gmail
on your work laptop, it checks:-
Device health
-
User identity
-
Geo-location
-
Then allows access
-
-
Zero Trust
=Verification at every layer
Term | Definition | Real-Life Example |
---|---|---|
Threat |
Potential danger (attacker or event) | Phishing email, malware, disgruntled employee |
Risk |
The impact if a threat exploits a vulnerability | If phishing succeeds, attacker gets access to finance system |
-
Formula
: -
Risk
=Threat
Ă—Vulnerability
Ă—Impact
-
So
:-
No vulnerability
=No risk
(even if threat exists
) -
No threat
=No risk
(even if you have a vulnerability
)
-
Principle | Description | Example |
---|---|---|
CIA |
Core principles (Confidentiality , Integrity , Availability ) |
Bank account info |
DAD |
Attacker goals (Disclosure , Alteration , Denial ) |
Data leak , tampering , DDoS |
Defense-in-Depth |
Layered security model |
Physical + network + access control |
Security Models |
Theoretical security designs |
Bell-LaPadula , Biba , Clark-Wilson |
ISO/IEC 19249 |
Design principles for secure architecture |
Least Privilege , Secure Defaults |
Zero Trust |
Never trust , always verify |
Google BeyondCorp |
Threat vs Risk |
Threat = attacker/event , Risk = damage |
Phishing email vs stolen credentials |