Knowledge Base Overview
This is still a proof of concept!
Architecture #
Access Control #
Security Model #
Attacks #
Availability #
Data Theft #
Exploitation #
Human Factor #
Network Security #
Persistence #
Physical Security #
Post Exploitation #
Remote Access #
Social Engineering #
Concepts #
Fundamentals #
Cryptography #
Asymmetric #
Certificates #
Hashing #
Protocols #
Symmetric #
Defense #
Application Security #
Authentication #
- JSON Web Token
- Multi-Factor Authentication
- Open Authorization
- Security Assertion Markup Language
- Single Sign-On
Authorization #
Configuration #
Data Security #
Deception #
Endpoint Security #
Isolation #
Monitoring #
Network Security #
Malware #
Crypto Malware #
Distributed #
Persistence #
Remote Access #
Spyware #
Stealth #
Methodology #
Assessment #
Information Gathering #
Risk Assessment #
Risk Management #
Operations #
Collaborative Security #
Defensive Security #
Investigation #
Offensive Security #
Proactive Defense #
Security Operations #
Vulnerability Management #
Pentesting #
Application Security #
- Dynamic Application Security Testing
- Interactive Application Security Testing
- Static Application Security Testing
Network Security #
Standards #
Compliance #
- General Data Protection Regulation
- Health Insurance Portability and Accountability Act
- ISO/IEC 27001
- National Institute of Standards and Technology
- Payment Card Industry Data Security Standard
Vulnerability Management #
- Common Vulnerabilities and Exposures
- Common Vulnerability Scoring System
- Common Weakness Enumeration
Uphill Security