Cybersecurity
Chapters
  • Getting Started
  • Tools
  • PHP Fundamentals
  • PHP Techniques
  • Fundamental Security Principles
  • Common Attacks and Preventions
  • Other Security Terms and Topics
Getting Started
  • HTML Primer
  • CSS Primer
  • PHP Primer
  • MySQL Primer
Tools
  • Installing Burp
PHP Fundamentals
  • PHP: Data Types
  • PHP: Conditionals
  • PHP: Loops
  • PHP: User-defined functions
  • PHP: Code organization
  • PHP: Encoding for URLs
  • PHP: Encoding for HTML
  • PHP: Redirecting Requests
  • PHP: Cookies and Sessions
PHP Techniques
  • Connecting to a database
  • Form processing
  • Data validations
  • Object-Oriented Programming (OOP)
Fundamental Security Principles
  • Never trust users
  • Least privilege
  • Simple is more secure
  • Expect the unexpected
  • Defense in depth
  • Security through obscurity
  • Prefer whitelisting over blacklisting
  • Map data movement and exposure
Common Attacks and Preventions
  • URL Manipulation
  • Social Engineering
  • Insecure Direct Object Reference
  • Cross-Site Scripting (XSS)
  • SQL Injection (SQLI)
  • File Upload Abuse
  • Remote Code Execution
  • Footprinting, Enumeration, and Fingerprinting
  • Faked Requests
  • Clickjacking
  • Cross-Site Request Forgery (CSRF)
  • Cookie Theft and Manipulation
  • Session Hijacking
  • Session Fixation
  • Username Enumeration
  • Brute Force Attack
  • Dictionary Attack
  • Credential Theft
  • Privilege Escalation
  • Domain Hijacking
  • DNS Hijacking
  • Man in the Middle
  • Denial of Service
  • Drive-By Downloads
  • Watering Hole Attack
  • Ransomware
  • DMA Attack
  • Advanced Persistent Threats
Other Security Terms and Topics
  • Zero-day Exploits
  • Semantic Versioning
  • Common Vulnerabilities and Exposures (CVE)
  • HTTP Request Types (GET vs. POST)
  • Content Security Policy
  • Prepared Statements
  • Encryption
  • Simple Ciphers
  • Symmetric Key Algorithms
  • Public Key Cryptography
  • Cryptographic Hash Algorithms
  • Checksums
  • User Authentication
  • Password Authentication
  • Password Hashing
  • Rainbow Tables
  • Salts
  • Search Key Space
  • Strong Passwords
  • Password Managers
  • Handling Forgotten Passwords
  • Multi-Factor Authentication
  • Biometric Authentication
  • SSH Keys
  • Throttling
  • SSL and TLS
  • HTTPS and Certificates
  • Forward Secrecy
  • Domain Name System
  • Firewalls
  • Intrusion Detection System
  • Risk Assessment
  • Penetration Testing
  • Threat Monitoring
  • Incident Response
Updated almost 10 years ago | View on GitHub

Fundamental Security Principles

There are eight fundamental security principles. These principles are the basis for all security defenses. Attacks developed in the future may evolve, but these guiding principles will always be the foundation for preventing them.

  1. Never trust users
  2. Least privilege
  3. Simple is more secure
  4. Expect the unexpected
  5. Defense in depth
  6. Security through obscurity
  7. Prefer whitelisting over blacklisting
  8. Map data movement and exposure