Skip to content

Commit 48594fe

Browse files
committed
minor typo-error fix
1 parent 554fac3 commit 48594fe

2 files changed

Lines changed: 4 additions & 4 deletions

File tree

2022/Days/day02.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The big question is how do we get those features and bug fixes into our products
5353

5454
How do we release the new application version? This is one of the main tasks for a DevOps engineer, and the important thing here is not to just figure out how to do this once but we need to do this continuously and in an automated, efficient way which also needs to include testing!
5555

56-
This is where we are going to end this day of learning, hopefully, this was useful. Over the next few days, we are going to dive a little deeper into some more areas of DevOps and then we will get into the sections that dive deeper into the tooling and processes and the benefits of these.
56+
This is where we are going to end this day of learning, hopefully, this was useful. Over the next few days, we are going to dive a little deeper into some other areas of DevOps and then we will get into the sections that dive deeper into the tooling and processes and the benefits of these.
5757

5858
## Resources
5959

2023/day03.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ We must consider the following:
2929

3030
The motivations of an attacker will also be different depending on the attacker. I mean it could just be for fun... We have probably all been there, in school and just gone a little too deep into the network looking for more information. Who has a story to tell?
3131

32-
But as we have seen in the media attacks are more aligned to monetary, fraud or even political attacks on businesses and organisations.
32+
But as we have seen in the media, attacks are more aligned to monetary, fraud or even political attacks on businesses and organisations.
3333

3434
In the Kubernetes space, we have even seen attackers leveraging and using the computing power of an environment to mine cryptocurrency.
3535

@@ -41,9 +41,9 @@ A company’s data is likely going to be extremely valuable to the company but a
4141

4242
We now have a motive and some of the characteristics of an attacker or a group of attackers, if this is a planned attack then you are going to need a plan, you are going to need to identify what services and data you are targeting.
4343

44-
An attack map is a visual representation of an attack on a computer network. It shows the various stages of the attack, the tools and techniques used by the attacker, and the points of entry and exit into the network. Attack maps can be used to analyse the details of past attacks, identify vulnerabilities in a network, and plan defences against future attacks. They can also be used to communicate information about an attack to non-technical stakeholders, such as executives or legal teams.
44+
An **attack** map is a visual representation of an attack on a computer network. It shows the various stages of the attack, the tools and techniques used by the attacker, and the points of entry and exit into the network. Attack maps can be used to analyse the details of past attacks, identify vulnerabilities in a network, and plan defences against future attacks. They can also be used to communicate information about an attack to non-technical stakeholders, such as executives or legal teams.
4545

46-
You can see from the above description that an Attack Map should be created on both sides or both teams (teams wise this is something I am going to cover in a later post)
46+
You can see from the above description that an Attack Map should be created on both sides or both teams (teams-wise this is something I am going to cover in a later post)
4747

4848
If you were to create an Attack Map of your home network or your business some of the things, you would want to capture would be:
4949

0 commit comments

Comments
 (0)