Show Menu
Cheatography

Security Cheat Sheet Cheat Sheet (DRAFT) by

Security Cheat Sheet By Karthikeyan

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Security Cheat Sheet

Network Security
Identity Management
Access Management
Common Vulner­ability

Network Security

Network protocols
Encryption
Hashing
Digital Signature
Digital Certif­icates
Firewall

Symmetric Key (Single Key / Secret Key)

Symmetric Key (Single Key / Secret Key)
Asymmetric Key (Public - Private Key)
One key will be generated & used for both encryption & decryption
Server will generate Two keys; one key will be set as Public Key & Other will be Private key.

Network Protocols

Hypertext Transfer Protocol Secure (HTTPS)
HTTPS
Secure File Transfer Protocol
SFTP
IMAP over SSL
IMAPS
Secure Post Office Protocol
POP3S
Secure Lightw­eight Directory Access Protocol
Secure LDAP
Secure Protocols to be used for public resources.
Secure Protocols are slower than Non-Secure Protocols due to additional security layers.
 

Symmetric Key (Single Key / Secret Key)

Symmetric Key (Single Key / Secret Key)
Asymmetric Key (Public - Private Key)
One key will be generated & used for both encryption & decryption
Server will generate Two keys; one key will be set as Public Key & Other will be Private key.