Map of Computer Security
🍎Targets
🚪Weaknesses
🛡️Defenses
🐛Threats
Operating system security
Secure by design
IDS
Malware
Viruses
Cyberattack
Leaked, stolen, weak passwords
Security through obscurity
Default Credential vulnerability
Password
MFA
Digital signature
Password cracking
Keystroke logging
Phishing
ACL
Privilege escalation
AvailabilityMessage authenticationSession
Firewalls
DDoS mitigation
Message authentication code
TLS,HSTS,WPA3
Web exploitsCross-site scriptingDenial-of-service attacksMITMSession hijacking
Data breachCryptographic attacksTamperingRansomware
Arbitrary code execution
Security bug
Buffer overflow
Security testing
Defensive programming
Secure coding
Buffer overflow protection
NX bit
ASLR
Code injectionExploits
Private account
CC
Ad credit
Password recovery
Social engineering
Working - A workbench area for contributors.