This repository contains a collection of IT cheatsheets to help you quickly reference essential information. You can download the chosen file in PDF/doc.x format from the selected md. extension file.
- number of layer;
- name;
- function;
- type of data processed;
- common protocols and standards.
- Hierarchic model of domains;
- Name, functions, definitions and examples of real domains;
- Model of URL (Uniform Resource Locator), with brief description of its parts.
- Detection and Analysis;
- Containment, Eradication, and Recovery;
- Post-Incident Activity.
- Name of the protocol;
- Port number;
- TCP or UDP port usage;
- OSI layer;
- Essential functions;
- Possible vectors of attack;
- State of security.
- class of the response code;
- number;
- meaning/function.
- Name: the name of the cryptographic standard;
- Symmetric or asymmetric: whether the standard is based on symmetric or asymmetric encryption;
- How it works: a brief explanation of how the standard processes data (e.g., block cipher, stream cipher);
- Variations: any known variations or versions of the standard;
- Possible vectors of attacks: potential vulnerabilities or weaknesses that could be exploited by an attacker to compromise the security of the standard.
- Name: Identifies a wireless authentication method, security protocol, authentication framework, or network access protocol;
- Encryption: Specifies the encryption techniques used to secure wireless data transmission;
- Process and Authentication: Describes the steps and methods involved in verifying the identity of devices or users connecting to the network;
- Additional Security: Includes any extra security measures provided by the wireless mechanism to enhance protection;
- Compatibility: Indicates the compatibility of the wireless mechanism with different devices, networks, or protocols;
- Security: Represents the level of security provided by the wireless mechanism, considering factors such as encryption strength, authentication robustness, and additional security features. Green is considered safe, red is considered not safe.
To access the chosen topic, navigate to the main branch of the repository and select the file with the .md extension, or simply click the link.
This repository is licensed under the MIT License.
If you would like to contribute to this repository, please feel free to submit a pull request. All contributions are welcome and appreciated.