Security
Threat models, cryptography, and defensive engineering.
3,052 lessons·First 10 free
- 1CIA Triad: Confidentiality, Integrity, AvailabilityFree
- 2Least Privilege PrincipleFree
- 3Defense in DepthFree
- 4Fail-Safe Defaults and Secure by DefaultFree
- 5Complete MediationFree
- 6Open Design and Security Through ObscurityFree
- 7Separation of Duties and Privilege SeparationFree
- 8Economy of Mechanism and Keep It SimpleFree
- 9Psychological Acceptability and Usable SecurityFree
- 10Attack Surface ReductionFree
- 11Trust Boundaries and Implicit TrustPro
- 12Security as a Non-Functional RequirementPro
- 13CIA Triad: Confidentiality, Integrity, AvailabilityPro
- 14The Parkerian Hexad: Extending the CIA TriadPro
- 15Bell-LaPadula Model: Confidentiality ControlPro
- 16Biba Model: Integrity ProtectionPro
- 17Clark-Wilson Model: Commercial IntegrityPro
- 18Chinese Wall Model: Conflict of Interest PreventionPro
- 19Access Control Models: DAC, MAC, and RBACPro
- 20Attribute-Based Access Control (ABAC)Pro
- 21Security Frameworks: NIST Cybersecurity FrameworkPro
- 22ISO 27001 and Security Management SystemsPro
- 23Defense-in-Depth PhilosophyPro
- 24Security Layer CategoriesPro
- 25Perimeter vs Internal SecurityPro
- 26Compensating ControlsPro
- 27Security Control TypesPro
- 28Redundancy and Diversity in SecurityPro
- 29Security Choke PointsPro
- 30Weakest Link AnalysisPro
- 31Security as Continuous Improvement, Not a Final StatePro
- 32The Security Lifecycle: Plan-Do-Check-ActPro
- 33Threat Landscape Evolution and Adaptive SecurityPro
- 34Security Maturity Models and AssessmentPro
- 35Balancing Security with Usability and Business GoalsPro
- 36Building a Security Culture and MindsetPro