Catalog / Cybersecurity Essentials Cheatsheet
Cybersecurity Essentials Cheatsheet
A quick reference guide covering fundamental cybersecurity concepts, tools, and techniques for both beginners and professionals. This cheat sheet provides a concise overview of key topics to help you navigate the complex world of cybersecurity.
Core Concepts
Security Principles
Confidentiality |
Ensuring that information is accessible only to authorized individuals or systems. |
Integrity |
Maintaining the accuracy and completeness of information; preventing unauthorized modification or deletion. |
Availability |
Ensuring that authorized users have timely and reliable access to information and resources. |
Authentication |
Verifying the identity of a user, device, or system attempting to access resources. |
Non-Repudiation |
Ensuring that parties cannot deny their actions or commitments related to data. |
Defense in Depth |
Implementing multiple layers of security controls to protect assets. |
Common Threats
Malware |
Malicious software (viruses, worms, Trojans) designed to harm or disrupt systems. |
Phishing |
Deceptive attempts to obtain sensitive information (usernames, passwords, credit card details) by disguising as a trustworthy entity. |
Ransomware |
Malware that encrypts a victim’s files, demanding a ransom payment for the decryption key. |
SQL Injection |
An attack that exploits vulnerabilities in database queries to gain unauthorized access or modify data. |
Cross-Site Scripting (XSS) |
An attack where malicious scripts are injected into trusted websites, targeting users. |
Denial of Service (DoS) |
Overwhelming a system or network with traffic, making it unavailable to legitimate users. |
Vulnerability Types
Buffer Overflow |
Writing data beyond the allocated buffer, potentially overwriting adjacent memory and causing crashes or enabling code execution. |
Integer Overflow |
Performing an arithmetic operation that exceeds the maximum value representable by an integer type, leading to unexpected results and potentially exploitable conditions. |
Format String Vulnerability |
Exploiting improper use of format string functions (e.g., |
Race Condition |
A situation where the behavior of a program depends on the unpredictable order in which multiple processes or threads access shared resources. |
Use-After-Free |
Accessing memory that has been freed, leading to unpredictable behavior, crashes, or potential security vulnerabilities. |
Heap Overflow |
Similar to buffer overflow, but occurring in the heap (dynamic memory allocation) region. |
Cryptography
Symmetric Encryption
AES (Advanced Encryption Standard) |
A widely used symmetric block cipher, known for its security and performance. Commonly used with key sizes of 128, 192, or 256 bits. |
DES (Data Encryption Standard) |
An older symmetric block cipher, now considered insecure due to its small key size (56 bits). Superseded by AES. |
3DES (Triple DES) |
A more secure variant of DES, applying the DES algorithm three times with multiple keys. However, it is slower than AES. |
Blowfish/Twofish |
Another symmetric block cipher algorithm. |
Asymmetric Encryption
RSA (Rivest-Shamir-Adleman) |
A widely used asymmetric algorithm for encryption and digital signatures. Relies on the difficulty of factoring large numbers. |
ECC (Elliptic Curve Cryptography) |
An asymmetric algorithm offering strong security with smaller key sizes compared to RSA. Commonly used in mobile devices and embedded systems. |
Diffie-Hellman |
A key exchange protocol that allows two parties to establish a shared secret key over an insecure channel. |
DSA (Digital Signature Algorithm) |
A standard for creating digital signatures. |
Hashing Algorithms
SHA-256 (Secure Hash Algorithm 256-bit) |
A cryptographic hash function that produces a 256-bit hash value. Widely used for data integrity and security applications. |
SHA-3 (Secure Hash Algorithm 3) |
The latest version of SHA algorithms. |
MD5 (Message Digest Algorithm 5) |
An older hash function that produces a 128-bit hash value. Considered insecure for many applications due to collision vulnerabilities. |
bcrypt |
A popular password-hashing function that incorporates salting to protect against rainbow table attacks. |
Network Security
Common Ports
21 |
FTP (File Transfer Protocol) |
22 |
SSH (Secure Shell) |
23 |
Telnet |
25 |
SMTP (Simple Mail Transfer Protocol) |
53 |
DNS (Domain Name System) |
80 |
HTTP (Hypertext Transfer Protocol) |
443 |
HTTPS (HTTP Secure) |
3389 |
RDP (Remote Desktop Protocol) |
Firewalls
Firewalls control network traffic based on predefined rules. Types:
|
Functionality:
|
Intrusion Detection/Prevention Systems (IDS/IPS)
IDS/IPS monitor network traffic for malicious activity. Types:
|
Functionality:
|
Security Tools
Vulnerability Scanners
Tools that automatically scan systems and networks for known vulnerabilities. Examples:
|
Key Features:
|
Penetration Testing Tools
Tools used to simulate real-world attacks to identify security weaknesses. Examples:
|
Key Features:
|
SIEM (Security Information and Event Management)
Tools that aggregate and analyze security logs and events from various sources. Examples:
|
Key Features:
|