Map of Computer Security
|
🍎 |
🚪 |
🛡️ |
🐛 | |
| general | Software system | Vulnerability | ||
|---|---|---|---|---|
| Authentication | Identity | Login | ||
| Authorization | Privilege | Debugging and administration tools Default permissions Backdoor |
Principle of least privilege | |
| Network | Broadband access |
Web exploits | ||
| Data | Privacy Data integrity Confidentiality Sensitive information |
Data access | Data security Encryption Data erasure Chain of trust Canary trap NBDE |
|
| Application | Code | |||
| Social networks |
Private account Ad credit |
Weak passwords
Password recovery |
Security awareness | |
| Artificial intelligence | Machine learning | DL Cyber threat, Deepfake | AI safety, ML defenses, CLEVER score | Adversarial machine learning |
Table of Contents
- Introduction
- General Security and Passwords
- Malware
- Web
- Online Security Good Practices
- Data Encryption
- Personal Information and Privacy
- Ethical Hacking
- Further reading
Working - A workbench area for contributors.