Authentication vs Authorization
Authentication verifies WHO you are with passwords or biometrics. Authorization determines WHAT you can access based on permissions and roles.
Welcome to the complete index of every article in our Cybersecurity Privacy collection on When Notes Fly. This page lists all 19 articles in the section, organized alphabetically for easy reference. Each piece is researched, written by hand, and grounded in academic sources, professional practice, or empirical data. Whether you are diving into Cybersecurity Privacy for the first time or returning to find a specific article, the index below gives you direct access to the full collection within Technology.
If you are new to Cybersecurity Privacy, we recommend starting with the foundational explainers and definitions before moving on to specific case studies, applied frameworks, and deeper analytical pieces. Articles are written for thoughtful readers who want substance over summary, with clear explanations of how ideas connect, where they come from, and why they matter. Use this index as a navigational map: skim the titles, read the short summaries, and click through to the pieces that draw your interest. Each article also links to related material so you can follow a thread of ideas across our entire Technology library.
Authentication verifies WHO you are with passwords or biometrics. Authorization determines WHAT you can access based on permissions and roles.
Common breach causes: weak credentials like default passwords, unpatched vulnerabilities with known fixes, misconfigured cloud storage.
Data protection fundamentals: encryption at rest and in transit, access controls using least privilege granting only necessary permissions.
Understand how passwords get hacked through brute force, dictionary attacks, credential stuffing, and rainbow tables — and why length beats complexity, plus the case for password managers.
Learn how phishing attacks work — from spear phishing and whaling to smishing and vishing — including the psychological techniques attackers use and how to defend against them.
Protect your privacy online with practical, research-backed steps. Browser choices, password security, email privacy, and mobile settings that actually make a difference in 2026.
Privacy by Design builds privacy into systems from start. Seven principles: proactive prevention, default privacy settings, embedded protection.
Security protects from threats like unauthorized access and breaches. Privacy controls data use—what's collected, shared, and stored about individuals.
Security risk management: identify threats and assets, assess likelihood and impact of each risk, then mitigate through controls and monitoring.
Secure system design principles: Defense in depth uses multiple layers, least privilege grants minimum necessary access, fail secure defaults to locked.
Security tradeoffs: security vs usability where protection adds friction, security vs performance where encryption slows systems.
Threat modeling process: identify assets to protect like data and systems, identify threat actors like hackers or insiders, and analyze attack vectors.
API security protects the interfaces that connect software systems. Learn the OWASP API Security Top 10, authentication best practices, rate limiting, and how to avoid common vulnerabilities.
Cybersecurity explained: the threat landscape, how phishing and attacks work, NIST 2024 password guidance, MFA types compared, zero trust model, and what individuals vs organizations should do.
Encryption converts readable data into an unreadable format that only authorized parties can decode, protecting information from interception and theft.
End-to-end encryption protects your messages so that only you and the recipient can read them. Learn how public-key cryptography works, how Signal, WhatsApp, and Telegram compare, and the metadata problem.
Ethical hacking involves testing systems with permission to find vulnerabilities before attackers do. Learn how bug bounties, pen testing, and responsible disclosure work.
Zero trust security rejects the old perimeter model. Learn how the 'never trust, always verify' framework works, where it came from, and how organizations implement it.
The dark web explained: difference between surface, deep, and dark web; how Tor works; who built it; Silk Road, law enforcement limits, and legitimate uses.
« Back to Cybersecurity Privacy · All Technology Articles · Home