๐ Architecture Diagrams & References
Visual reference models, attack lifecycles, defense architectures, and maturity frameworks for cybersecurity training and interview preparation.
Defense-in-Depth Model
Layered security architecture from perimeter to data
๐ Perimeter Security
DDoS Protection, CDN, WAF
โ
๐ฅ Network Security
NGFW, IDS/IPS, Segmentation
โ
๐ป Host Security
EDR, Hardening, Patch Mgmt
โ
๐ฑ Application Security
SAST, DAST, WAF, RASP
โ
๐พ Data Security
Encryption, DLP, Classification
โ
๐ค Identity Security
IAM, MFA, PAM, Zero Trust
Cyber Kill Chain
Lockheed Martin attack lifecycle model
๐ Reconnaissance
Gather target information
โ
โ๏ธ Weaponization
Create exploit payload
โ
๐ง Delivery
Phishing, drive-by, supply chain
โ
๐ฅ Exploitation
Execute vulnerability exploit
โ
๐ฆ Installation
Install backdoor / RAT
โ
๐ก Command & Control
Establish C2 channel
โ
๐ฏ Actions on Objectives
Data exfil, destruction, ransomware
Incident Response Lifecycle
NIST SP 800-61 incident handling process
๐ Preparation
IR plan, tools, team, training
โ
๐ Detection & Analysis
Alert triage, IOC analysis, scope
โ
๐ก๏ธ Containment
Short-term and long-term containment
โ
๐งน Eradication
Remove threat, patch vulnerability
โ
๐ Recovery
Restore systems, verify integrity
โ
๐ Post-Incident Review
Lessons learned, detection improvement
MITRE ATT&CK Tactics
Enterprise ATT&CK tactic categories
๐ Reconnaissance
Gathering target information
โ
๐ช Initial Access
Phishing, exploits, supply chain
โ
โก Execution
Running malicious code
โ
๐ Persistence
Maintaining foothold
โ
โฌ๏ธ Privilege Escalation
Gaining higher permissions
โ
๐ Credential Access
Stealing credentials
โ
โ๏ธ Lateral Movement
Moving through network
โ
๐ค Exfiltration
Stealing data
Zero Trust Architecture
NIST SP 800-207 zero trust model
๐ค Subject
User, device, or workload requesting access
โ
๐ Policy Enforcement Point
Gateway that enforces access decisions
โ
๐ง Policy Decision Point
Evaluates identity, context, risk
โ
๐ Trust Algorithm
Device health, behavior, threat intel
โ
๐ข Enterprise Resource
Application, data, or service accessed
SOC Maturity Model
SOC capability maturity progression
๐ Level 1 โ Reactive
Ad-hoc response, basic SIEM, manual processes
โ
๐ Level 2 โ Proactive
Defined playbooks, SOAR, regular hunting
โ
๐ Level 3 โ Adaptive
Threat-intel driven, ATT&CK mapping, metrics
โ
๐ Level 4 โ Predictive
ML-powered detection, auto-response, AI triage
โ
๐ Level 5 โ Autonomous
Full AISecOps, self-healing, continuous optimization