Skip to content

DannnyzZ/IT-Vademecum-Cheatsheets

Repository files navigation

WELCOME TO MY REPOSITORY

IT Cheatsheets

This repository contains a collection of IT cheatsheets to help you quickly reference essential information. You can download the chosen file in PDF/doc.x format from the selected md. extension file.

Contents

1. OSI model

  • number of layer;
  • name;
  • function;
  • type of data processed;
  • common protocols and standards.

LINK

2. Domain hierarchy

  • Hierarchic model of domains;
  • Name, functions, definitions and examples of real domains;
  • Model of URL (Uniform Resource Locator), with brief description of its parts.

LINK

3. Incident handling checklist

  • Detection and Analysis;
  • Containment, Eradication, and Recovery;
  • Post-Incident Activity.

LINK

4. Network protocols

  • Name of the protocol;
  • Port number;
  • TCP or UDP port usage;
  • OSI layer;
  • Essential functions;
  • Possible vectors of attack;
  • State of security.

LINK

5. HTTP response codes

  • class of the response code;
  • number;
  • meaning/function.

LINK

6. Cryptography standards

  • Name: the name of the cryptographic standard;
  • Symmetric or asymmetric: whether the standard is based on symmetric or asymmetric encryption;
  • How it works: a brief explanation of how the standard processes data (e.g., block cipher, stream cipher);
  • Variations: any known variations or versions of the standard;
  • Possible vectors of attacks: potential vulnerabilities or weaknesses that could be exploited by an attacker to compromise the security of the standard.

LINK

7. Wireless networking – authentication methods/frameworks, security/network access protocols

  • Name: Identifies a wireless authentication method, security protocol, authentication framework, or network access protocol;
  • Encryption: Specifies the encryption techniques used to secure wireless data transmission;
  • Process and Authentication: Describes the steps and methods involved in verifying the identity of devices or users connecting to the network;
  • Additional Security: Includes any extra security measures provided by the wireless mechanism to enhance protection;
  • Compatibility: Indicates the compatibility of the wireless mechanism with different devices, networks, or protocols;
  • Security: Represents the level of security provided by the wireless mechanism, considering factors such as encryption strength, authentication robustness, and additional security features. Green is considered safe, red is considered not safe.

LINK

Navigating through repository

To access the chosen topic, navigate to the main branch of the repository and select the file with the .md extension, or simply click the link.

License

This repository is licensed under the MIT License.

Contributing

If you would like to contribute to this repository, please feel free to submit a pull request. All contributions are welcome and appreciated.