Hexagons background
COMPUTER SECURITY

To start with Computer Security, it's a good idea to start with foundational concepts such as

1. Networking: Understanding how data is transferred over networks. Networks serve as the foundation for modern computing interfaces and understanding how they work is essential to understanding how to secure these networks. A good way to get started is by looking at the book &"Computer Networking: A Top Down Approach" by James Kurose and Keith Ross.


2. Cyber Security principles: Cyber security, next, helps you recognize vulnerabilities, assess risks, and deploy safeguards. "Cybersecurity Essentials" by Charles J. Brooks and Christopher Grow is a pretty easy to read book for getting started. If you'd rather try something more hands-on, OWASP is a non profit organization that talks about improving security for web applications, and is working to improve software security in general. Their website is quite a nice resource.

  (a.) Cryptography: Cryptography is a popular aspect of Cyber security, that involves turning plaintext (readable data) into ciphertext (encoded, unintelligible data) using algorithms and keys, which are referred to as cryptographic algorithms and keys, to maintain confidentiality, and authenticity of information. For example, when you checkout popular pages (subreddits) on Reddit, such as r/AITA, a lot of cryptography goes behind ensuring that the content's not been tampered with since its submission, protecting the user's anonymity, establishing a link between the author and their submission to ensure credibility of user submissions, etcetera!
  If you'd like to delve more into Cryptography, here are some great courses offered by Stanford for beginners: Cryptography 1, Cryptography 2

  (b.) Since Security is rapidly evolving, it's quite important to keep up with what's happening in the field and follow along. If you'd like to do so, here's a pretty nice newsletter called Crypto-Gram, that taks about emerging threats, new developments, and current events in Cryptography.