A general collection of knowledge, notes, and research related to software security.
- Authentication
- Authorization
- Accountability (Logging)
- Confidentiality (Encryption)
- Software Design Fundamentals
- Defense in Depth
- CIA Triad (Cornerstones)
- Security Policies
- Exploitation Basics
- Fundamental Design Flaws (Strong Coupling / Shatter Attack)