Notes

Brief reference notes from ongoing cybersecurity coursework and applied information assurance research.
These entries capture key tools, frameworks, and concepts used across network security, cryptography, and risk management studies.

Network Security Tools

Scanning & Enumeration

Concepts


Cryptography

Core Algorithms

Hybrid Protocols

Protocols combining both symmetric and asymmetric encryption:

See related study →


Security Frameworks & Standards

NIST Core References

Other Frameworks

Explore applied frameworks →

Risk Management Concepts

Core Steps

  1. Identify assets and data flows
  2. Evaluate threats and vulnerabilities
  3. Determine likelihood and impact
  4. Prioritize and mitigate

Methods

Example Formula

Risk = Likelihood × Impact

Reference Library

Primary

Supplemental