Cybersecurity Notes 1
Cybersecurity Notes 1
1. Introduction to Cybersecurity
Anas Sarfaraz
5. Security Measures & Technologies
Anas Sarfaraz
OWASP Top 10: A list of the most common and critical security
risks for web applications.
1. Injection: SQL injection, command injection.
2. Broken Authentication: Insecure login mechanisms.
3. Sensitive Data Exposure: Insufficient data protection.
4. XML External Entities (XXE): Vulnerabilities in XML
parsers.
5. Broken Access Control: Inadequate restriction of user
actions.
6. Security Misconfiguration: Default settings, open cloud
storage.
7. Cross-Site Scripting (XSS): Injecting malicious scripts into
web pages.
8. Insecure Deserialization: Vulnerabilities related to unsafe
data deserialization.
9. Using Components with Known Vulnerabilities: Unpatched
software and libraries.
10. Insufficient Logging & Monitoring: Lack of proper
system monitoring.
Anas Sarfaraz
Incident Response: A structured approach to identifying,
managing, and mitigating security incidents.
o Incident Response Plan (IRP): A formalized plan for
responding to cyber incidents.
o Stages of Incident Response: Preparation, Identification,
Containment, Eradication, Recovery, and Lessons Learned.
Business Continuity and Disaster Recovery (BCDR): Ensuring
that critical business functions continue in case of an incident,
and data can be restored.
Anas Sarfaraz
9. Cloud Security
Anas Sarfaraz
11. Security Policies and Compliance
Anas Sarfaraz
13. Emerging Threats and Trends
Anas Sarfaraz