Map of Computer Security
Appearance
🍎 |
🚪 |
🛡️ |
🐛 | |
general | Software system | Vulnerability | ||
---|---|---|---|---|
Authentication | Identity | Login | ||
Authorization | Privilege | Debugging and administration tools Default permissions Backdoor |
Principle of least privilege | |
Network | Broadband access |
Web exploits | ||
Data | Privacy Data integrity Confidentiality Sensitive information |
Data access | Data security Encryption Data erasure Chain of trust Canary trap NBDE |
|
Application | Code | |||
Social networks |
Private account Ad credit |
Weak passwords
Password recovery |
Security awareness | |
Artificial intelligence | Machine learning | DL Cyber threat, Deepfake | AI safety, ML defenses, CLEVER score | Adversarial machine learning |