Difference between revisions of "Template:Information security"

From blackwiki
Jump to navigation Jump to search
imported>Elrasheid44
m (change of sequentially of computer security Issue ,regard to development of computer technology.and adding the Information security title as the separate topic.)
imported>Oranjelo100
 
(58 intermediate revisions by 11 users not shown)
Line 1: Line 1:
{{sidebar
+
{{ sidebar
| pretitle = This article is part of a series on
+
| name    = Information security
|title = [[Computer security]]
+
| pretitle = Part of a series on
|titlestyle = background:#ffc0c0
+
| title   = [[Information security]]
|headingstyle = background:#ffc0c0; font-size:larger
+
| class    = hlist
  
|heading2 = Related security categories
+
| heading2 = Related security categories
|content2style = text-align:left
+
| content2 =
|content2 =
+
* [[Automotive security]]
*[[Information security]]
+
* [[Cybercrime]]
*[[Network security]]
+
** [[Cybersex trafficking]]
*[[Internet security]]
+
** [[Computer fraud]]
*[[Cybersecurity standards]]
+
* [[Cyberwarfare]]
*[[Mobile security]]
+
* [[Electronic warfare]]
*[[Automotive security]]
+
* [[Information warfare]]
*[[Cybercrime]]
+
* [[Internet security]]
*[[Cybersex trafficking]]
+
* [[Mobile security]]
*[[Computer fraud]]
+
* [[Network security]]
*[[Cyberwarfare]]
+
* [[Copy protection]]
 +
* [[Digital rights management]]
  
 +
| heading3  = Threats
 +
| content3  =
 +
* [[Adware]]
 +
* [[Advanced persistent threat]]
 +
* [[Arbitrary code execution]]
 +
* [[Backdoor (computing)|Backdoors]]
 +
* [[Hardware backdoors]]
 +
* [[Code injection]]
 +
* [[Crimeware]]
 +
* [[Cross-site scripting]]
 +
* [[Cryptojacking malware]]
 +
* [[Botnet]]s
 +
* [[Data breach]]
 +
* [[Drive-by download]]
 +
* [[Malware]] [[browser helper object]]s
 +
* [[Computer crime]]
 +
* [[Computer virus|Viruses]]
 +
* [[Data scraping]]
 +
* [[Denial of service]]
 +
* [[Eavesdropping]]
 +
* [[Email fraud]]
 +
* [[Email spoofing]]
 +
* [[Exploit (computer security)|Exploits]]
 +
* [[Keylogger]]s
 +
* [[Logic bomb]]s
 +
* [[Time bomb (software)|Time bombs]]
 +
* [[Fork bomb]]s
 +
* [[dialer#Fraudulent dialer|Fraudulent dialers]]
 +
* [[Malware]]
 +
* [[Payload (computing)|Payload]]
 +
* [[Phishing]]
 +
* [[Polymorphic engine]]
 +
* [[Privilege escalation]]
 +
* [[Ransomware]]
 +
* [[Rootkit]]s
 +
* [[Bootkit]]s
 +
* [[Scareware]]
 +
* [[Shellcode]]
 +
* [[Spamming]]
 +
* [[Screen scrape|Screen scraping]]
 +
* [[Spyware]]
 +
* [[Software bug]]s
 +
* [[Trojan horse (computing)|Trojan horses]]
 +
* [[Hardware Trojan]]s
 +
* [[Remote access trojan]]s
 +
* [[Vulnerability (computing)|Vulnerability]]
 +
* [[Web shell]]s
 +
* [[Wiper (malware)|Wiper]]
 +
* [[Computer worm|Worms]]
 +
* [[SQL injection]]
 +
* [[Rogue security software]]
 +
* [[Zombie (computing)|Zombie]]
  
 +
| heading4  = Defenses
 +
| content4  =
 +
* [[Anomaly detection]]
 +
* [[Computer access control]]
 +
* [[Application security]]
 +
** [[Antivirus software]]
 +
** [[Computer security software]]
 +
** [[Secure coding]]
 +
** [[Secure by default]]
 +
** [[Secure by design]]
 +
*** [[Misuse case]]
 +
** [[Security-focused operating system]]
 +
* [[Authentication]]
 +
** [[Multi-factor authentication]]
 +
* [[Authorization]]
 +
* [[Data-centric security]]
 +
* [[Code obfuscation]]
 +
* [[Encryption]]
 +
* [[Firewall (computing)|Firewall]]
 +
* [[Intrusion detection system]]
 +
** [[Host-based intrusion detection system]] (HIDS)
 +
* [[Security information and event management]]
 +
* [[Mobile secure gateway]]
 +
* [[Runtime application self-protection]]
 +
* [[Web application security]]
  
 
|heading3 = Threats
 
|content3style = text-align:left
 
|content3 =
 
*[[Advanced persistent threat]]
 
*[[Backdoor (computing)|Backdoors]]
 
*[[Bootkit]]s
 
*[[Computer crime]]
 
*[[Computer virus|Viruses]]
 
*[[Denial of service]]
 
*[[Eavesdropping]]
 
*[[Exploit (computer security)|Exploits]]
 
*[[Keylogger]]s
 
*[[Logic bomb]]s
 
*[[Malware]]
 
*[[Payload (computing)|Payloads]]
 
*[[Phishing]]
 
*[[Ransomware]]
 
*[[Rootkit]]s
 
*[[Screen scrape|Screen scrapers]]
 
*[[Spyware]]
 
*[[Trojan horse (computing)|Trojans]]
 
*[[Vulnerability (computing)|Vulnerabilities]]
 
*[[Web shell]]s
 
*[[Web application security]]
 
*[[Computer worm|Worms]]
 
 
|heading4 = Defenses
 
|content4style = text-align:left
 
|content4 =
 
*[[Computer access control]]
 
*[[Application security]]
 
**[[Antivirus software]]
 
**[[Secure coding]]
 
**[[Secure by default]]
 
**[[Secure by design]]
 
**[[Security-focused operating system|Secure operating systems]]
 
*[[Authentication]]
 
**[[Multi-factor authentication]]
 
*[[Authorization]]
 
*[[Data-centric security]]
 
*[[Encryption]]
 
*[[Firewall (computing)|Firewall]]
 
*[[Intrusion detection system]]
 
*[[Mobile secure gateway]]
 
*[[Runtime application self-protection|Runtime application self-protection (RASP)]]
 
 
|name = Information security
 
 
}}<noinclude>{{Documentation}}</noinclude>
 
}}<noinclude>{{Documentation}}</noinclude>

Latest revision as of 15:18, 13 February 2021

Template documentation[view] [edit] [history] [purge]

Usage