Cyber Security
Table of Contents
1. Abstract
Programs are just as secure as the intent and awareness of the programmer. Consequently, an important aspect of exploring CyberSecurity as a domain is rooted in Social Engineering.
I've Aliased this node as Hacking as well but I do acknowledge the more respectful "elegant programs" sense of the word "hack" as it was originally intended to be used.
Wish to keep nodes relatively colloquial rather than being correct to a fault when it comes to common interpretation of these notes.
I'll refrain from using "hacking" anymore in these nodes unless I really mean hacking away at something with an axe.
As for thinking in an offensive manner, as many have already documented, understanding a system's weaknesses is the most explicit way towards strengthening its defenses.
3. Resources
3.1. Hacking: the Art of Exploitation
- following the book to learn about what computers really are and to be able to think about secure software
- not explicitly relevant to my domain but I'm generically into computers and wish to know more
- will not be posting notes as they are from the textbook, but will be populating nodes without too many explicit linkages.
3.2. Linux basics for Hackers
- occupy the web
- actively building cybersec skill