Basicly Cybersecurity Fundamental
Mar 31, 2022
CIA Triad
- Confidentiality (The right data is going to the right users.)
- Integrity (Actually getting good data from trusted sources.)
- Availability (The right people can access the right data at the right time.)
AAA
- Authentication
- Authorization
- Accounting
OWASP TOP 10
A1: Broken Object Level Authentication
A2: Broken Authentication
A3: Excessive Data Exposure
A4: Lack of Resources & Rate Limiting
A5: Broken Functional Level Authentication
A6: Mass Assignment
A7: Security Misconfiguration
A8: Injection
A9: Improper Assets Management
A10: Insufficient Logging & Monitoring