Map of Computer Security
Appearance
🍎 |
🚪 |
🛡️ |
🐛 | |
general | Software system | Vulnerability | ||
---|---|---|---|---|
Authentication | Identity | Login | ||
Authorization | Privilege | Debugging and administration tools Default permissions Backdoor |
Principle of least privilege | |
Network | Broadband access |
Web exploits | ||
Data | Privacy Data integrity Confidentiality Sensitive information |
Data access | Data security Encryption Data erasure Chain of trust Canary trap NBDE |
|
Application | Code | |||
Social networks |
Private account Ad credit |
Weak passwords
Password recovery |
Security awareness | |
Artificial intelligence | Machine learning | DL Cyber threat, Deepfake | AI safety, ML defenses, CLEVER score | Adversarial machine learning |
Table of Contents
[edit | edit source]- Introduction
- General Security and Passwords
- Malware
- Web
- Online Security Good Practices
- Data Encryption
- Personal Information and Privacy
- Ethical Hacking
- Further reading
Working - A workbench area for contributors.