Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
(←Replaced content with '~~') |
imported>Oranjelo100 |
||
(133 intermediate revisions by 52 users not shown) | |||
Line 1: | Line 1: | ||
− | + | {{ sidebar | |
+ | | name = Information security | ||
+ | | pretitle = Part of a series on | ||
+ | | title = [[Information security]] | ||
+ | | class = hlist | ||
+ | |||
+ | | heading2 = Related security categories | ||
+ | | content2 = | ||
+ | * [[Automotive security]] | ||
+ | * [[Cybercrime]] | ||
+ | ** [[Cybersex trafficking]] | ||
+ | ** [[Computer fraud]] | ||
+ | * [[Cyberwarfare]] | ||
+ | * [[Electronic warfare]] | ||
+ | * [[Information warfare]] | ||
+ | * [[Internet security]] | ||
+ | * [[Mobile security]] | ||
+ | * [[Network security]] | ||
+ | * [[Copy protection]] | ||
+ | * [[Digital rights management]] | ||
+ | |||
+ | | heading3 = Threats | ||
+ | | content3 = | ||
+ | * [[Adware]] | ||
+ | * [[Advanced persistent threat]] | ||
+ | * [[Arbitrary code execution]] | ||
+ | * [[Backdoor (computing)|Backdoors]] | ||
+ | * [[Hardware backdoors]] | ||
+ | * [[Code injection]] | ||
+ | * [[Crimeware]] | ||
+ | * [[Cross-site scripting]] | ||
+ | * [[Cryptojacking malware]] | ||
+ | * [[Botnet]]s | ||
+ | * [[Data breach]] | ||
+ | * [[Drive-by download]] | ||
+ | * [[Malware]] [[browser helper object]]s | ||
+ | * [[Computer crime]] | ||
+ | * [[Computer virus|Viruses]] | ||
+ | * [[Data scraping]] | ||
+ | * [[Denial of service]] | ||
+ | * [[Eavesdropping]] | ||
+ | * [[Email fraud]] | ||
+ | * [[Email spoofing]] | ||
+ | * [[Exploit (computer security)|Exploits]] | ||
+ | * [[Keylogger]]s | ||
+ | * [[Logic bomb]]s | ||
+ | * [[Time bomb (software)|Time bombs]] | ||
+ | * [[Fork bomb]]s | ||
+ | * [[dialer#Fraudulent dialer|Fraudulent dialers]] | ||
+ | * [[Malware]] | ||
+ | * [[Payload (computing)|Payload]] | ||
+ | * [[Phishing]] | ||
+ | * [[Polymorphic engine]] | ||
+ | * [[Privilege escalation]] | ||
+ | * [[Ransomware]] | ||
+ | * [[Rootkit]]s | ||
+ | * [[Bootkit]]s | ||
+ | * [[Scareware]] | ||
+ | * [[Shellcode]] | ||
+ | * [[Spamming]] | ||
+ | * [[Screen scrape|Screen scraping]] | ||
+ | * [[Spyware]] | ||
+ | * [[Software bug]]s | ||
+ | * [[Trojan horse (computing)|Trojan horses]] | ||
+ | * [[Hardware Trojan]]s | ||
+ | * [[Remote access trojan]]s | ||
+ | * [[Vulnerability (computing)|Vulnerability]] | ||
+ | * [[Web shell]]s | ||
+ | * [[Wiper (malware)|Wiper]] | ||
+ | * [[Computer worm|Worms]] | ||
+ | * [[SQL injection]] | ||
+ | * [[Rogue security software]] | ||
+ | * [[Zombie (computing)|Zombie]] | ||
+ | |||
+ | | heading4 = Defenses | ||
+ | | content4 = | ||
+ | * [[Anomaly detection]] | ||
+ | * [[Computer access control]] | ||
+ | * [[Application security]] | ||
+ | ** [[Antivirus software]] | ||
+ | ** [[Computer security software]] | ||
+ | ** [[Secure coding]] | ||
+ | ** [[Secure by default]] | ||
+ | ** [[Secure by design]] | ||
+ | *** [[Misuse case]] | ||
+ | ** [[Security-focused operating system]] | ||
+ | * [[Authentication]] | ||
+ | ** [[Multi-factor authentication]] | ||
+ | * [[Authorization]] | ||
+ | * [[Data-centric security]] | ||
+ | * [[Code obfuscation]] | ||
+ | * [[Encryption]] | ||
+ | * [[Firewall (computing)|Firewall]] | ||
+ | * [[Intrusion detection system]] | ||
+ | ** [[Host-based intrusion detection system]] (HIDS) | ||
+ | * [[Security information and event management]] | ||
+ | * [[Mobile secure gateway]] | ||
+ | * [[Runtime application self-protection]] | ||
+ | * [[Web application security]] | ||
+ | |||
+ | }}<noinclude>{{Documentation}}</noinclude> |
Latest revision as of 15:18, 13 February 2021
The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |