Basicly Cybersecurity Fundamental

CIA Triad

  • Confidentiality (The right data is going to the right users.)
  • Integrity (Actually getting good data from trusted sources.)
  • Availability (The right people can access the right data at the right time.)

AAA

  • Authentication
  • Authorization
  • Accounting

OWASP TOP 10

A1: Broken Object Level Authentication

A2: Broken Authentication

A3: Excessive Data Exposure

A4: Lack of Resources & Rate Limiting

A5: Broken Functional Level Authentication

A6: Mass Assignment

A7: Security Misconfiguration

A8: Injection

A9: Improper Assets Management

A10: Insufficient Logging & Monitoring

--

--