Cyber Sphere and Cybersecurity v2
Cyber Sphere and Cybersecurity v2
Resources:
https://www.geeksforgeeks.org/basics-computer-networking/
https://www.geeksforgeeks.org/tcp-3-way-handshake-process/
https://www.geeksforgeeks.org/open-systems-interconnection-model-osi/
https://www.geeksforgeeks.org/how-does-the-internet-work/
https://www.simplilearn.com/tutorials/cyber-security-tutorial/cyber-security-for-
beginners
https://www.sailpoint.com/identity-library/cia-triad
https://www.geeksforgeeks.org/cryptography-and-its-types/
https://www.microsoft.com/en-in/security/business/security-101/what-is-identity-
access-management-iam
https://www.upguard.com/blog/vulnerability
https://www.balbix.com/insights/what-is-a-vulnerability/
https://www.hackerone.com/knowledge-center/what-security-testing
https://www.geeksforgeeks.org/security-testing/
https://www.ibm.com/think/topics/penetration-testing
https://www.proofpoint.com/us/threat-reference/social-engineering
https://www.ibm.com/think/topics/dfir
https://www.proofpoint.com/us/threat-reference/cyber-crime
https://cybercrime.gov.in/webform/crimecatdes.aspx
https://www.lexisnexis.in/blogs/cyber-law-in-india/
https://www.imperva.com/learn/application-security/cyber-warfare/
https://www.ibm.com/think/topics/business-continuity-disaster-recovery
https://www.ibm.com/think/topics/cyber-risk-management
https://www.ibm.com/think/topics/data-privacy
https://www.digitalguardian.com/blog/what-indias-digital-personal-data-
protection-dpdp-act-rights-responsibilities-everything-you