This is a draft cheat sheet. It is a work in progress and is not finished yet.
Security Cheat Sheet
Network Security |
Identity Management |
Access Management |
Common Vulnerability |
|
Network Security
Network protocols |
Encryption |
Hashing |
Digital Signature |
Digital Certificates |
Firewall |
|
Symmetric Key (Single Key / Secret Key)
Symmetric Key (Single Key / Secret Key) |
Asymmetric Key (Public - Private Key) |
One key will be generated & used for both encryption & decryption |
Server will generate Two keys; one key will be set as Public Key & Other will be Private key. |
Network Protocols
Hypertext Transfer Protocol Secure (HTTPS) |
HTTPS |
Secure File Transfer Protocol |
SFTP |
IMAP over SSL |
IMAPS |
Secure Post Office Protocol |
POP3S |
Secure Lightweight Directory Access Protocol |
Secure LDAP |
Secure Protocols to be used for public resources.
Secure Protocols are slower than Non-Secure Protocols due to additional security layers.
|
|
Symmetric Key (Single Key / Secret Key)
Symmetric Key (Single Key / Secret Key) |
Asymmetric Key (Public - Private Key) |
One key will be generated & used for both encryption & decryption |
Server will generate Two keys; one key will be set as Public Key & Other will be Private key. |
|