Welcome to My personal CyberSecurity Notes! This repository is a curated collection of concepts, explanations, real-world examples, and best practices related to cybersecurity.
- Please read the DISCLAIMER.md before using or referencing this content.
-
Governance:- Managing and directing an organisation or system to achieve its objectives and ensure compliance with laws, regulations, and standards.
-
Regulation:- A rule or law enforced by a governing body to ensure compliance and protect against harm.
-
Compliance:- The state of adhering to laws, regulations, and standards that apply to an organisation or system.
-
Cybersecurity governance is the
frameworkused by organizations to manage and direct their security efforts. It ensures that:-
Cybersecurity aligns with business goals
-
Risks are identified and managed
-
Policies, roles, and responsibilities are clearly defined
-
Legal and regulatory compliance is maintained
-
| Component | Description |
|---|---|
Policies & Standards |
Define how the organization protects data and systems (e.g., password policies, encryption standards). |
Risk Management |
Identifies, assesses, and prioritizes cybersecurity risks. |
Roles & Responsibilities |
Assigns responsibilities (CISO, IT Admin, Security Analyst, etc.). |
Monitoring & Reporting |
Ensures continuous oversight and improvement of security controls. |
Incident Response Plan |
Guides how to respond to cyber incidents effectively. |
| Law/Framework | Purpose |
|---|---|
GDPR (EU) |
General Data Protection Regulation: Protects personal data and privacy of EU citizens. Heavy fines for data breaches. |
HIPAA (USA) |
Protects health information in the healthcare sector. |
PCI-DSS |
For organizations handling credit card data (banks, payment processors). |
NIST Framework (USA) |
National Institute of Standards and Technology: A security guideline followed by government and private companies. |
| Law/Policy | Description |
|---|---|
IT Act 2000 |
Main cyber law in India. Covers hacking, identity theft, cyber terrorism, etc. |
CERT-In Guidelines (2022) |
Indian Computer Emergency Response Team mandates breach reporting within 6 hours. |
Data Protection Act (2023) |
Aims to safeguard personal data and privacy of Indian citizens (inspired by GDPR). |
Digital India Initiatives |
Promotes cybersecurity in e-Governance, digital banking, and Aadhaar systems. |
-
Let’s say
"SecureBank Ltd."is a digital bank in India. -
👨💼
Governance:-
The
CISOsets a policy: All customer data must be encrypted and stored in India. -
A risk assessment shows their mobile app backend is vulnerable.
-
Security team is assigned responsibility to fix it within 30 days.
-
-
📜
Regulation:-
They follow
CERT-In rulesand must report any data breach within6 hours. -
They must comply with
Data Protection Act 2023ensuring customers can delete or correct their data. -
Their credit card processing must meet
PCI-DSS standards.
-
| Tool/Framework | Usage |
|---|---|
ISO/IEC 27001 |
International standard for managing information security |
NIST CSF |
Risk management and cybersecurity best practices |
COBIT |
Governance framework for IT management |
SOC 2 |
Audit standard for service providers handling data |
-
Cybersecurity governance= Strategy + policies + roles for secure operations. -
Regulation= Laws enforced by governments to protect user data and systems. -
Real-world organizations must follow both internal policies (governance) and external laws (regulation).
-
Non-compliance can result in
hefty fines,loss of reputation, or evenlegal action.
-
The
Cyber Kill Chain— a concept developed byLockheed Martinin2011. -
The
Cyber Kill Chainis aframeworkthat outlines the steps adversaries follow to launch and execute acyberattack. It helps defenders identify and stop attackers at various stages.
-
What happens:- The attacker gathers information about the target organization (
OSINT,social media,employee info,tech stack)
- The attacker gathers information about the target organization (
-
Real-World Example:-
Attacker searches for examplecorp.com on:
-
LinkedIn (employee names, job titles)
-
Shodan (open servers and devices)
-
Google Dork:
site:examplecorp.com filetype:pdf
-
Finds exposed
PDF documentswithemployee emailsandinternal IPs.
-
-
Defender Tip: Monitor for unauthorized scanning and public exposure of internal docs.
-
What happens:- The attacker crafts a
weaponized payloadusing an exploit + a backdoor or malware.
- The attacker crafts a
-
Real-World Example:- Attacker creates a malicious
PDF filethat uses an old Adobe Reader vulnerability to run a reverse shell.
- Attacker creates a malicious
-
Defender Tip: Usesandboxingandantivirusto detect crafted payloads before they execute.
-
What happens: -
The attacker delivers the payload via:
-
Email (phishing)
-
USB drops
-
Malicious websites
-
Drive-by downloads
-
-
Real-World Example:-
A
phishing emailis sent to an employee pretending to be HR with a subject:"Salary Hike Details - March 2025" -
Attached
PDFhas the exploit fromStep 2.
-
-
Defender Tip: Train employees to recognize phishing. Use email filters and spam protection.
-
What happens:- Once the victim opens the payload, the exploit runs and executes the attacker's code.
-
Real-World Example:-
Employee opens the malicious
PDF. -
Exploit triggers, runs areverse shell: -
Attacker gets
low-privileged accessto theuser’s system.
-
-
Defender Tip: Keep software patched. Useendpoint detection(EDR).
-
What happens:- Attacker installs
malware(backdoor,keylogger,trojan) to maintain access.
- Attacker installs
-
Real-World Example:- Attacker installs
Cobalt Strike BeaconorNetcat listenerforpersistence:
nc -nlvp 4444
- Attacker installs
-
Defender Tip: Monitorregistry changes,startup scripts, and usebehavior-based detection.
-
What happens:- The attacker establishes communication with the victim's system to send commands and receive stolen data.
-
Real-World Example:-
Infected system pings a remote
C2server every 10 seconds via HTTP. -
Attacker sends command to
escalate privilegesordownload more malware.
-
-
Defender Tip: Monitoroutbound trafficfor connections tounusual domainsorIPs.
-
What happens: -
Attacker performs the intended objective:
-
Data theft -
Destroy systems -
Ransomware attack -
Lateral movement
-
-
Real-World Example:-
Attacker uses stolen credentials to access the
finance department server. -
Exfiltratespayroll data and sends to external server.
-
-
Defender Tip: Use fileintegrity monitoring,DLP systems, androle-based access control.
| Stage | Attacker's Action | Real-World Example | Defense |
|---|---|---|---|
1. Reconnaissance |
Gather info |
Google, LinkedIn, Shodan |
OSINT monitoring |
2. Weaponization |
Create payload |
Malicious PDF with exploit |
Sandbox, signature detection |
3. Delivery |
Send payload |
Phishing email |
Email filters, training |
4. Exploitation |
Trigger exploit |
PDF opens reverse shell |
Patching, EDR |
5. Installation |
Install malware |
Cobalt Strike beacon |
Behavior detection |
6. Command & Control |
Remote control |
C2 via HTTP to attacker server |
Monitor outbound traffic |
7. Actions on Objectives |
Final impact |
Data exfiltration |
DLP, logging, SIEM |
-
Attacker identifies target
John@company.comon LinkedIn (Recon). -
Crafts a PDF with an exploit and backdoor (
Weaponization). -
Sends a phishing email (
Delivery). -
John opens it, exploit runs (
Exploitation). -
Malware installs, persists (
Installation). -
Machine connects to attacker’s C2 server (
C2). -
Attacker steals sensitive internal financial reports (
Objectives).
-
What is it? -
A foundational model for ensuring information security. It stands for:
-
Confidentiality -
Integrity -
Availability
-
-
Real-World Examples:
| Principle | Meaning | Example |
|---|---|---|
Confidentiality |
Only authorized people can access data | Bank encrypts your account details; attacker cannot read your ATM PIN |
Integrity |
Data should not be tampered with | Tamper-proof logs in a healthcare system; no one can alter patient records |
Availability |
Systems/data should be accessible when needed | Google services (Gmail, Drive) must be available 24/7; DDOS protection ensures this |
-
While
CIAis from thedefender’s side,DADis from theattacker’s view:-
Disclosure (breaking confidentiality) -
Alteration (breaking integrity) -
Destruction/Denial (breaking availability)
-
-
Example:-
Attacker
leaks passwords→Disclosure -
Modifiesa company invoice →Alteration -
Launches
DDoSon a website →Denial
-
-
What is it? -
A layered security strategy where multiple controls are in place so if one fails, others still protect the system.
-
Real-World Example:-
Let’s say you're protecting a data center:
-
Physical Security–Security guards,keycards -
Network Security–Firewalls,IDS/IPS -
System Security–Antivirus,EDR tools -
Access Control–Role-based access -
Encryption–For stored and transmitted data -
Monitoring–SIEM,alert systems
-
-
Even if an attacker breaks in at one level, other levels still stop or detect the threat.
- Security models are theoretical frameworks used to design secure systems
| Model | Focus | Real-Life Example |
|---|---|---|
Bell-LaPadula |
Confidentiality only | Military systems where data classification matters (Top Secret, Secret, Confidential) |
Biba Model |
Integrity | Medical databases to prevent doctors from altering lab results |
Clark-Wilson |
Commercial integrity | Banking systems ensuring only approved transactions are allowed |
Brewer-Nash (Cinderella Model) |
Prevent conflict of interest | Legal firms can't let lawyers access two competing client cases |
-
What is it? -
This standard defines
five architectural design principlesfor secure systems:-
Security Policy Enforcement
-
Security Function Isolation
-
Least Privilege
-
Secure Defaults
-
Open Design
-
-
Example: -
A
banking appfollowing these principles:-
Gives minimum access to each user role (e.g., teller vs manager)
-
Logs every transaction (Policy Enforcement)
-
Runs critical functions in isolated containers (Isolation)
-
-
Trust but Verify(Old Model):- Once you’re inside the network, you're
trusted.
- Once you’re inside the network, you're
-
Example:Employee connects to company Wi-Fi→Gets access to file servers without re-authentication.
-
Problem: If attacker gains internal access, they can move laterally without being stopped. -
Zero Trust(Modern Model): -
“Never trust, always verify.” -
Even inside the network, you must authenticate and authorize every time.
-
Real-World Example:GoogleusesBeyondCorp(Zero Trust model).
-
If you access
Gmailon your work laptop, it checks:-
Device health -
User identity -
Geo-location -
Then allows access
-
-
Zero Trust=Verification at every layer
| Term | Definition | Real-Life Example |
|---|---|---|
Threat |
Potential danger (attacker or event) | Phishing email, malware, disgruntled employee |
Risk |
The impact if a threat exploits a vulnerability | If phishing succeeds, attacker gets access to finance system |
-
Formula: -
Risk=Threat×Vulnerability×Impact -
So:-
No vulnerability=No risk(even if threat exists) -
No threat=No risk(even if you have a vulnerability)
-
| Principle | Description | Example |
|---|---|---|
CIA |
Core principles (Confidentiality, Integrity, Availability) |
Bank account info |
DAD |
Attacker goals (Disclosure, Alteration, Denial) |
Data leak, tampering, DDoS |
Defense-in-Depth |
Layered security model |
Physical + network + access control |
Security Models |
Theoretical security designs |
Bell-LaPadula, Biba, Clark-Wilson |
ISO/IEC 19249 |
Design principles for secure architecture |
Least Privilege, Secure Defaults |
Zero Trust |
Never trust, always verify |
Google BeyondCorp |
Threat vs Risk |
Threat = attacker/event, Risk = damage |
Phishing email vs stolen credentials |