SlideShare a Scribd company logo
Effective Report Writing
Cyber Security
whoami?
Ashwini Varadkar
Sr. Security Analyst
5. 6 years of Experience in Cyber Security
Avid Reader
Kathak Professional
Special Love Towards Reporting :p
What is a Report?
“Report” is derived
from the Latin word
of “reportare”
which means carry
back. Re is back
and portare means
to carry.
Represents
information in
structured format,
is short and concise,
purposeful, and has
audience.
Cyber Security and Reports - The
Inseparables
• SOC
• Assessment
• DFIR
• GRC
The Reality Check!
As to how did we realize that there is a gap that needs to be addressed?
• Leader/Reviewer/Project Manager
• Other way:
• Client report rejection
• Social media posts
• Not talked about a lot
Need for Effective Writing
Reputation Consulting
Common Mistakes
COMMUNICATING
SOMEONE ELSE’S OUTPUT
VAGUE SENTENCES IMAGE RELATED ISSUES
Common Concerns
• Unable to lead people through the content in a structured way. They
should get the information that they want quickly and easily.
• Confusion often arises about the writing style, what to include, the
language to use, the length of the document and other factors.
What is Effective? :/
Rules
Concept
Formal Writings
• What all comes under the umbrella of formal writing?
• Academic research papers
• Business presentations,
• Emails and memorandums
• Business reports for conveying information
• and other types of official correspondence.
Contractions
• Avoid using contracted words.
E.g.:
oShould + not = Shouldn’t
oWill + not = Won’t
oAre + not = Aren’t
oIs + not = Isn’t
Stay Active
• Active voices – Sentences that are direct and concise.
E.g.
o Passive voice – An instance of XSS was observed by the analyst.
o Active voice – The analyst observed an XSS instance.
o Passive voice – Instructions will be given to you by the assessor.
o Active voice – The assessor will give you instructions.
Capitalization in Titles
• Thumb Rule:
o Capitalize the important words in the title
o E.g – Weak Password Policy in Use
o E.g – Cross-Site Request Forgery (CSRF)
• So which words are usually written in lowercase when creating headlines and
titles?
o Articles (a, an, the)
o Coordinating Conjunctions (and, but, for)
o Short (less than 5 letters) Prepositions (at, by, from)
Consistency
is the KEY
• Lower Case Titles
o E.g – Weak password policy in use
o E.g – Cross-site request forgery (CSRF)
• Same rule applies to the image captions (these are nothing but short
titles).
Capitalization in Sentences
• Avoid random capitalization of letters in sentences.
oE.g: URL's should not contain any Sensitive Information, for example, a session
Token, as the information is often logged at various locations.
oSimply: URL's should not contain any sensitive information, for example, a
session token, as the information is often logged at various locations.
• Capitalize proper nouns (names, countries, cities) such as the below
sentence.
oE.g: xyzOrg discovered multiple instances of weak physical security in
SampleOrganization’s Chicago data centre.
Software Name
• It is JavaScript (abbreviated as JS) and not Javascript
• jQuery and not Jquery or JQuery
• Clickjacking and not ClickJacking
Simply check the tool/service/software name on their official websites!
This also applies to attack names.
• EternalBlue
• POODLE
Consistency
is the KEY
Highlights and Emphasis
• Make relevant highlights.
• Use single or double quotes to stress on a word. Ensure consistency.
• Subtitles can be emphasized by using bold (under PoC section, under
Remediation).
• Observe the template. If XYZ uses single quotes for highlights, continue
that in your write up too.
Consistency
is the KEY
Images
• General points:
• All images must be aligned in one specific
way.
• Relevant masking must be done.
• Relevant highlights must be made.
• Image should be clear.
Consistency
is the KEY
Conclusion
• Note the points discussed here
• Write
• Write down the points
• Frame sentence around it
• Ask for help
• Share the responsibilities
• Courses / Apps
• Books/Ebooks
• Checklist
Consistency
is the KEY
Thank You J

More Related Content

Similar to Effective Cyber Security Report Writing

Software Design
Software DesignSoftware Design
Software Design
Ahmed Misbah
 
Hidden sides of Code Review (Do-iOS)
Hidden sides of Code Review (Do-iOS)Hidden sides of Code Review (Do-iOS)
Hidden sides of Code Review (Do-iOS)
Dmitrii Ivanov
 
Weekairtificial intelligence 8-Module 7 NLP.pptx
Weekairtificial intelligence  8-Module 7 NLP.pptxWeekairtificial intelligence  8-Module 7 NLP.pptx
Weekairtificial intelligence 8-Module 7 NLP.pptx
funcrusherr
 
Keep It Simple - presentation at ASTC October 2018
Keep It Simple - presentation at ASTC October 2018Keep It Simple - presentation at ASTC October 2018
Keep It Simple - presentation at ASTC October 2018
Kirsty Taylor, CLPM
 
Technical+Writing+Introduction+PowerPoint.ppt+2223_1_(1).ppt
Technical+Writing+Introduction+PowerPoint.ppt+2223_1_(1).pptTechnical+Writing+Introduction+PowerPoint.ppt+2223_1_(1).ppt
Technical+Writing+Introduction+PowerPoint.ppt+2223_1_(1).ppt
Geetanjali Mishra
 
How to build a winning Data Science resume
How to build a winning Data Science resumeHow to build a winning Data Science resume
How to build a winning Data Science resume
Brian Spiering
 
Role of compliance in security audits
Role of compliance in security auditsRole of compliance in security audits
Role of compliance in security audits
n|u - The Open Security Community
 
SOFLUX Meetup - Landing on your dream job
SOFLUX Meetup - Landing on your dream jobSOFLUX Meetup - Landing on your dream job
SOFLUX Meetup - Landing on your dream job
Marta Guerra
 
principles of effective writing
principles of effective writingprinciples of effective writing
principles of effective writing
Dr Pooja Raj Srivastava
 
Tutorial on Opinion Mining and Sentiment Analysis
Tutorial on Opinion Mining and Sentiment AnalysisTutorial on Opinion Mining and Sentiment Analysis
Tutorial on Opinion Mining and Sentiment Analysis
Yun Hao
 
Braun, Clarke & Hayfield Thematic Analysis Part 3
Braun, Clarke & Hayfield Thematic Analysis Part 3Braun, Clarke & Hayfield Thematic Analysis Part 3
Braun, Clarke & Hayfield Thematic Analysis Part 3
Victoria Clarke
 
AI-SDV 2022: Embedding-based Search Vs. Relevancy Search: comparing the new w...
AI-SDV 2022: Embedding-based Search Vs. Relevancy Search: comparing the new w...AI-SDV 2022: Embedding-based Search Vs. Relevancy Search: comparing the new w...
AI-SDV 2022: Embedding-based Search Vs. Relevancy Search: comparing the new w...
Dr. Haxel Consult
 
How to Implement Domain Driven Design in Real Life SDLC
How to Implement Domain Driven Design  in Real Life SDLCHow to Implement Domain Driven Design  in Real Life SDLC
How to Implement Domain Driven Design in Real Life SDLC
Abdul Karim
 
Copywriting 101 - Delucchi Plus
Copywriting 101 - Delucchi PlusCopywriting 101 - Delucchi Plus
Copywriting 101 - Delucchi Plus
delucchiplus
 
2007 Writing Presentation given as guest lecturer, George Mason University
2007 Writing Presentation given as guest lecturer, George Mason University2007 Writing Presentation given as guest lecturer, George Mason University
2007 Writing Presentation given as guest lecturer, George Mason University
Stephen Bates
 
Prototyping Accessibility - WordCamp Europe 2018
Prototyping Accessibility - WordCamp Europe 2018Prototyping Accessibility - WordCamp Europe 2018
Prototyping Accessibility - WordCamp Europe 2018
Adrian Roselli
 
Code Quality Makes Your Job Easier
Code Quality Makes Your Job EasierCode Quality Makes Your Job Easier
Code Quality Makes Your Job Easier
Tonya Mork
 
Academic Writing and Error
Academic Writing and ErrorAcademic Writing and Error
Academic Writing and Error
DrAmitPurushottam
 
Sld-Natural-Language-Processing-for-large-volumes-of-human-text-data-Sozzi-Br...
Sld-Natural-Language-Processing-for-large-volumes-of-human-text-data-Sozzi-Br...Sld-Natural-Language-Processing-for-large-volumes-of-human-text-data-Sozzi-Br...
Sld-Natural-Language-Processing-for-large-volumes-of-human-text-data-Sozzi-Br...
hajinouha0
 
Content Academy - The art of self-proofing.pptx
Content Academy - The art of self-proofing.pptxContent Academy - The art of self-proofing.pptx
Content Academy - The art of self-proofing.pptx
MattScott93
 

Similar to Effective Cyber Security Report Writing (20)

Software Design
Software DesignSoftware Design
Software Design
 
Hidden sides of Code Review (Do-iOS)
Hidden sides of Code Review (Do-iOS)Hidden sides of Code Review (Do-iOS)
Hidden sides of Code Review (Do-iOS)
 
Weekairtificial intelligence 8-Module 7 NLP.pptx
Weekairtificial intelligence  8-Module 7 NLP.pptxWeekairtificial intelligence  8-Module 7 NLP.pptx
Weekairtificial intelligence 8-Module 7 NLP.pptx
 
Keep It Simple - presentation at ASTC October 2018
Keep It Simple - presentation at ASTC October 2018Keep It Simple - presentation at ASTC October 2018
Keep It Simple - presentation at ASTC October 2018
 
Technical+Writing+Introduction+PowerPoint.ppt+2223_1_(1).ppt
Technical+Writing+Introduction+PowerPoint.ppt+2223_1_(1).pptTechnical+Writing+Introduction+PowerPoint.ppt+2223_1_(1).ppt
Technical+Writing+Introduction+PowerPoint.ppt+2223_1_(1).ppt
 
How to build a winning Data Science resume
How to build a winning Data Science resumeHow to build a winning Data Science resume
How to build a winning Data Science resume
 
Role of compliance in security audits
Role of compliance in security auditsRole of compliance in security audits
Role of compliance in security audits
 
SOFLUX Meetup - Landing on your dream job
SOFLUX Meetup - Landing on your dream jobSOFLUX Meetup - Landing on your dream job
SOFLUX Meetup - Landing on your dream job
 
principles of effective writing
principles of effective writingprinciples of effective writing
principles of effective writing
 
Tutorial on Opinion Mining and Sentiment Analysis
Tutorial on Opinion Mining and Sentiment AnalysisTutorial on Opinion Mining and Sentiment Analysis
Tutorial on Opinion Mining and Sentiment Analysis
 
Braun, Clarke & Hayfield Thematic Analysis Part 3
Braun, Clarke & Hayfield Thematic Analysis Part 3Braun, Clarke & Hayfield Thematic Analysis Part 3
Braun, Clarke & Hayfield Thematic Analysis Part 3
 
AI-SDV 2022: Embedding-based Search Vs. Relevancy Search: comparing the new w...
AI-SDV 2022: Embedding-based Search Vs. Relevancy Search: comparing the new w...AI-SDV 2022: Embedding-based Search Vs. Relevancy Search: comparing the new w...
AI-SDV 2022: Embedding-based Search Vs. Relevancy Search: comparing the new w...
 
How to Implement Domain Driven Design in Real Life SDLC
How to Implement Domain Driven Design  in Real Life SDLCHow to Implement Domain Driven Design  in Real Life SDLC
How to Implement Domain Driven Design in Real Life SDLC
 
Copywriting 101 - Delucchi Plus
Copywriting 101 - Delucchi PlusCopywriting 101 - Delucchi Plus
Copywriting 101 - Delucchi Plus
 
2007 Writing Presentation given as guest lecturer, George Mason University
2007 Writing Presentation given as guest lecturer, George Mason University2007 Writing Presentation given as guest lecturer, George Mason University
2007 Writing Presentation given as guest lecturer, George Mason University
 
Prototyping Accessibility - WordCamp Europe 2018
Prototyping Accessibility - WordCamp Europe 2018Prototyping Accessibility - WordCamp Europe 2018
Prototyping Accessibility - WordCamp Europe 2018
 
Code Quality Makes Your Job Easier
Code Quality Makes Your Job EasierCode Quality Makes Your Job Easier
Code Quality Makes Your Job Easier
 
Academic Writing and Error
Academic Writing and ErrorAcademic Writing and Error
Academic Writing and Error
 
Sld-Natural-Language-Processing-for-large-volumes-of-human-text-data-Sozzi-Br...
Sld-Natural-Language-Processing-for-large-volumes-of-human-text-data-Sozzi-Br...Sld-Natural-Language-Processing-for-large-volumes-of-human-text-data-Sozzi-Br...
Sld-Natural-Language-Processing-for-large-volumes-of-human-text-data-Sozzi-Br...
 
Content Academy - The art of self-proofing.pptx
Content Academy - The art of self-proofing.pptxContent Academy - The art of self-proofing.pptx
Content Academy - The art of self-proofing.pptx
 

More from n|u - The Open Security Community

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
Osint primer
Osint primerOsint primer
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Nmap basics
Nmap basicsNmap basics
Metasploit primary
Metasploit primaryMetasploit primary
Api security-testing
Api security-testingApi security-testing
Api security-testing
n|u - The Open Security Community
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
n|u - The Open Security Community
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
n|u - The Open Security Community
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
n|u - The Open Security Community
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
n|u - The Open Security Community
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
n|u - The Open Security Community
 
Cloud security
Cloud security Cloud security
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
n|u - The Open Security Community
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
n|u - The Open Security Community
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
n|u - The Open Security Community
 
Linux for hackers
Linux for hackersLinux for hackers
Android Pentesting
Android PentestingAndroid Pentesting

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
chaudharyreet2244
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
whatchangedhowreflec
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
Celine George
 
family welfare programme-pptx details welfare
family welfare programme-pptx details welfarefamily welfare programme-pptx details welfare
family welfare programme-pptx details welfare
AnushreeBhunia
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
7DFarhanaMohammed
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Alexandra N. Martinez
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
Celine George
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 

Recently uploaded (20)

nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
 
family welfare programme-pptx details welfare
family welfare programme-pptx details welfarefamily welfare programme-pptx details welfare
family welfare programme-pptx details welfare
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 

Effective Cyber Security Report Writing

  • 2. whoami? Ashwini Varadkar Sr. Security Analyst 5. 6 years of Experience in Cyber Security Avid Reader Kathak Professional Special Love Towards Reporting :p
  • 3. What is a Report? “Report” is derived from the Latin word of “reportare” which means carry back. Re is back and portare means to carry. Represents information in structured format, is short and concise, purposeful, and has audience.
  • 4. Cyber Security and Reports - The Inseparables • SOC • Assessment • DFIR • GRC
  • 5. The Reality Check! As to how did we realize that there is a gap that needs to be addressed? • Leader/Reviewer/Project Manager • Other way: • Client report rejection • Social media posts • Not talked about a lot
  • 6. Need for Effective Writing Reputation Consulting
  • 7. Common Mistakes COMMUNICATING SOMEONE ELSE’S OUTPUT VAGUE SENTENCES IMAGE RELATED ISSUES
  • 8. Common Concerns • Unable to lead people through the content in a structured way. They should get the information that they want quickly and easily. • Confusion often arises about the writing style, what to include, the language to use, the length of the document and other factors.
  • 9. What is Effective? :/ Rules Concept
  • 10. Formal Writings • What all comes under the umbrella of formal writing? • Academic research papers • Business presentations, • Emails and memorandums • Business reports for conveying information • and other types of official correspondence.
  • 11. Contractions • Avoid using contracted words. E.g.: oShould + not = Shouldn’t oWill + not = Won’t oAre + not = Aren’t oIs + not = Isn’t
  • 12. Stay Active • Active voices – Sentences that are direct and concise. E.g. o Passive voice – An instance of XSS was observed by the analyst. o Active voice – The analyst observed an XSS instance. o Passive voice – Instructions will be given to you by the assessor. o Active voice – The assessor will give you instructions.
  • 13. Capitalization in Titles • Thumb Rule: o Capitalize the important words in the title o E.g – Weak Password Policy in Use o E.g – Cross-Site Request Forgery (CSRF) • So which words are usually written in lowercase when creating headlines and titles? o Articles (a, an, the) o Coordinating Conjunctions (and, but, for) o Short (less than 5 letters) Prepositions (at, by, from) Consistency is the KEY
  • 14. • Lower Case Titles o E.g – Weak password policy in use o E.g – Cross-site request forgery (CSRF) • Same rule applies to the image captions (these are nothing but short titles).
  • 15. Capitalization in Sentences • Avoid random capitalization of letters in sentences. oE.g: URL's should not contain any Sensitive Information, for example, a session Token, as the information is often logged at various locations. oSimply: URL's should not contain any sensitive information, for example, a session token, as the information is often logged at various locations. • Capitalize proper nouns (names, countries, cities) such as the below sentence. oE.g: xyzOrg discovered multiple instances of weak physical security in SampleOrganization’s Chicago data centre.
  • 16. Software Name • It is JavaScript (abbreviated as JS) and not Javascript • jQuery and not Jquery or JQuery • Clickjacking and not ClickJacking Simply check the tool/service/software name on their official websites! This also applies to attack names. • EternalBlue • POODLE Consistency is the KEY
  • 17. Highlights and Emphasis • Make relevant highlights. • Use single or double quotes to stress on a word. Ensure consistency. • Subtitles can be emphasized by using bold (under PoC section, under Remediation). • Observe the template. If XYZ uses single quotes for highlights, continue that in your write up too. Consistency is the KEY
  • 18. Images • General points: • All images must be aligned in one specific way. • Relevant masking must be done. • Relevant highlights must be made. • Image should be clear. Consistency is the KEY
  • 19. Conclusion • Note the points discussed here • Write • Write down the points • Frame sentence around it • Ask for help • Share the responsibilities • Courses / Apps • Books/Ebooks • Checklist Consistency is the KEY