Security Policy

🛡️ Educational Purpose Statement

This website is an educational cybersecurity portfolio created and maintained by Duc Nguyen, a third-year Information Security student at FPT University Hanoi. This site serves as a platform for documenting academic projects, security research, and professional development in the field of cybersecurity.


📚 Content Classification

✅ What This Site Contains

This portfolio includes the following types of educational content:

❌ What This Site Does NOT Contain

To be absolutely clear, this website does NOT host, distribute, or provide:


🎓 Educational Framework

All content on this site adheres to the following principles:

Academic Integrity

Ethical Hacking Standards

Industry Guidelines

This portfolio follows standards established by:


🔬 Research Methodology

Lab Environment

All technical demonstrations and security research are conducted in:

Data Sources

Technical content references only:

Responsible Disclosure

If vulnerabilities are discovered during research:

  1. Never publicly disclose without vendor coordination
  2. Follow CVE reporting procedures
  3. Allow adequate time for patching (typically 90 days)
  4. Document findings for educational purposes only after resolution

🚨 Reporting Security Concerns

If you have concerns about content on this site or believe something violates security/ethical guidelines:

Contact Information

What to Report

Please notify us if you observe:

Report Format

Subject: Security Concern - [Brief Description]

Description:
- URL/Page affected: [specific link]
- Nature of concern: [explain the issue]
- Suggested action: [optional]

Contact: [your email if you want a response]

🔐 Website Security

This Site’s Security Measures

Vulnerability Disclosure for This Site

If you discover a security vulnerability in this website itself (not the educational content):

  1. Do NOT publicly disclose the vulnerability
  2. Email details to: nminhducit@gmail.com with subject “Security Vulnerability Report”
  3. Include:
    • Vulnerability type (XSS, CSRF, etc.)
    • Steps to reproduce
    • Potential impact
    • Suggested fix (optional)
  4. Allow 7 days for initial response
  5. We will coordinate disclosure timeline with you

Acknowledgments

We will publicly acknowledge security researchers who responsibly disclose vulnerabilities (unless you prefer to remain anonymous).


📖 Content Disclaimer

Language & Context

When reading technical content on this site, please note:

Reader Responsibility

By accessing this content, you agree to:


🎯 Site Purpose

This portfolio serves to:

  1. Document Learning Journey: Track progress in cybersecurity education
  2. Demonstrate Skills: Showcase technical abilities to potential employers
  3. Share Knowledge: Help other students learning cybersecurity
  4. Professional Development: Build online presence in the security community
  5. Academic Portfolio: Maintain a record of coursework and projects

Fair Use

Technical discussions may reference:

All such references constitute fair use for educational purposes.

Jurisdiction

This site is operated from Vietnam and complies with Vietnamese law. Content is intended for a global educational audience.


🔄 Updates & Maintenance

This policy may be updated to reflect changes in:

Significant changes will be announced via commit history on GitHub.


📞 Additional Resources

Professional Organizations

Ethical Hacking Guidelines


✅ Verification

This security policy is:

Site Verification


🤝 Community

We welcome:

We do NOT welcome:


Thank you for taking the time to understand our commitment to ethical, educational cybersecurity content.

For questions about this policy, contact: nminhducit@gmail.com


**🛡️ Education • Ethics • Excellence 🛡️** *"With great knowledge comes great responsibility."* [![Security+](https://img.shields.io/badge/Studying-Security%2B-blue)](https://www.comptia.org/certifications/security) [![ISC2](https://img.shields.io/badge/Pursuing-ISC2%20CC-green)](https://www.isc2.org)