Map of Computer Security
| 
 🍎  | 
 🚪  | 
 🛡️  | 
 🐛  | |
| general | Software system | Vulnerability | ||
|---|---|---|---|---|
| Authentication | Identity | Login | ||
| Authorization | Privilege | Debugging and administration tools Default permissions Backdoor  | 
Principle of least privilege | |
| Network | Broadband access | 
 Web exploits  | ||
| Data | Privacy Data integrity Confidentiality Sensitive information  | 
Data access | Data security Encryption Data erasure Chain of trust Canary trap NBDE  | 
|
| Application | Code | |||
| Social networks | 
 Private account Ad credit  | 
Weak passwords
 Password recovery  | 
Security awareness | |
| Artificial intelligence | Machine learning | DL Cyber threat, Deepfake | AI safety, ML defenses, CLEVER score | Adversarial machine learning | 
Table of Contents
- Introduction
 - General Security and Passwords
 - Malware
 - Web
 - Online Security Good Practices
 - Data Encryption
 - Personal Information and Privacy
 - Ethical Hacking
 - Further reading
 
 Working - A workbench area for contributors.