Cybersecurity_Interview_Preparation_Guide
Cybersecurity_Interview_Preparation_Guide
What is security?
Security refers to measures and protocols designed to protect assets, systems, or data from
unauthorized access, harm, or disruption.
CIA Triad
- Confidentiality: Ensuring information is accessible only to authorized individuals.
- Integrity: Ensuring data accuracy and trustworthiness.
- Availability: Ensuring resources are accessible when needed.
Three-way handshake
A TCP connection setup process involving:
1. SYN: Client requests connection.
2. SYN-ACK: Server acknowledges request.
3. ACK: Client confirms connection.
Subdomain enumeration
Identifying subdomains associated with a domain to discover additional attack surfaces.
What is a subdomain?
A subdivision of a domain used to organize and navigate web resources (e.g.,
blog.example.com).
What is DNS?
The Domain Name System (DNS) translates domain names into IP addresses.
SQL Injection
An attack that manipulates SQL queries to access unauthorized data.