Difference between revisions of "Template:Information security"

From blackwiki
Jump to navigation Jump to search
imported>Thumperward
(merged)
imported>Oranjelo100
 
(50 intermediate revisions by 4 users not shown)
Line 1: Line 1:
{{sidebar
+
{{ sidebar
| pretitle = This article is part of a series on
+
| name    = Information security
|title = [[Information security]]
+
| pretitle = Part of a series on
|titlestyle = background:#ffc0c0
+
| title   = [[Information security]]
|headingstyle = background:#ffc0c0; font-size:larger
+
| class    = hlist
  
|heading2 = Related security categories
+
| heading2 = Related security categories
|content2style = text-align:left
+
| content2 =
|content2 =
+
* [[Automotive security]]
 +
* [[Cybercrime]]
 +
** [[Cybersex trafficking]]
 +
** [[Computer fraud]]
 +
* [[Cyberwarfare]]
 +
* [[Electronic warfare]]
 +
* [[Information warfare]]
 +
* [[Internet security]]
 +
* [[Mobile security]]
 +
* [[Network security]]
 +
* [[Copy protection]]
 +
* [[Digital rights management]]
  
*[[Automotive security]]
+
| heading3  = Threats
*[[Cybercrime]]
+
| content3  =
**[[Cybersex trafficking]]
+
* [[Adware]]
**[[Computer fraud]]
+
* [[Advanced persistent threat]]
*[[Cyberwarfare]]
+
* [[Arbitrary code execution]]
*[[Internet security]]
+
* [[Backdoor (computing)|Backdoors]]
*[[Mobile security]]
+
* [[Hardware backdoors]]
*[[Network security]]
+
* [[Code injection]]
 +
* [[Crimeware]]
 +
* [[Cross-site scripting]]
 +
* [[Cryptojacking malware]]
 +
* [[Botnet]]s
 +
* [[Data breach]]
 +
* [[Drive-by download]]
 +
* [[Malware]] [[browser helper object]]s
 +
* [[Computer crime]]
 +
* [[Computer virus|Viruses]]
 +
* [[Data scraping]]
 +
* [[Denial of service]]
 +
* [[Eavesdropping]]
 +
* [[Email fraud]]
 +
* [[Email spoofing]]
 +
* [[Exploit (computer security)|Exploits]]
 +
* [[Keylogger]]s
 +
* [[Logic bomb]]s
 +
* [[Time bomb (software)|Time bombs]]
 +
* [[Fork bomb]]s
 +
* [[dialer#Fraudulent dialer|Fraudulent dialers]]
 +
* [[Malware]]
 +
* [[Payload (computing)|Payload]]
 +
* [[Phishing]]
 +
* [[Polymorphic engine]]
 +
* [[Privilege escalation]]
 +
* [[Ransomware]]
 +
* [[Rootkit]]s
 +
* [[Bootkit]]s
 +
* [[Scareware]]
 +
* [[Shellcode]]
 +
* [[Spamming]]
 +
* [[Screen scrape|Screen scraping]]
 +
* [[Spyware]]
 +
* [[Software bug]]s
 +
* [[Trojan horse (computing)|Trojan horses]]
 +
* [[Hardware Trojan]]s
 +
* [[Remote access trojan]]s
 +
* [[Vulnerability (computing)|Vulnerability]]
 +
* [[Web shell]]s
 +
* [[Wiper (malware)|Wiper]]
 +
* [[Computer worm|Worms]]
 +
* [[SQL injection]]
 +
* [[Rogue security software]]
 +
* [[Zombie (computing)|Zombie]]
  
|heading3 = Threats
+
| heading4  = Defenses
|content3style = text-align:left
+
| content4  =
|content3 =
+
* [[Anomaly detection]]
*[[Advanced persistent threat]]
+
* [[Computer access control]]
*[[Backdoor (computing)|Backdoors]]
+
* [[Application security]]
*[[Computer crime]]
+
** [[Antivirus software]]
*[[Computer virus|Viruses]]
+
** [[Computer security software]]
*[[Denial of service]]
+
** [[Secure coding]]
*[[Eavesdropping]]
+
** [[Secure by default]]
*[[Exploit (computer security)|Exploits]]
+
** [[Secure by design]]
*[[Keylogger]]s
+
*** [[Misuse case]]
*[[Logic bomb]]s
+
** [[Security-focused operating system]]
*[[Malware]]
+
* [[Authentication]]
*[[Payload (computing)|Payloads]]
+
** [[Multi-factor authentication]]
*[[Phishing]]
+
* [[Authorization]]
*[[Ransomware]]
+
* [[Data-centric security]]
*[[Rootkit]]
+
* [[Code obfuscation]]
*[[Screen scrape|Screen scrapers]]
+
* [[Encryption]]
*[[Spyware]]
+
* [[Firewall (computing)|Firewall]]
*[[Trojan horse (computing)|Trojans]]
+
* [[Intrusion detection system]]
*[[Vulnerability (computing)|Vulnerabilities]]
+
** [[Host-based intrusion detection system]] (HIDS)
*[[Web shell]]s
+
* [[Security information and event management]]
*[[Web application security]]
+
* [[Mobile secure gateway]]
*[[Computer worm|Worms]]
+
* [[Runtime application self-protection]]
*[[SQL injection]]
+
* [[Web application security]]
  
|heading4 = Defenses
 
|content4style = text-align:left
 
|content4 =
 
*[[Computer access control]]
 
*[[Application security]]
 
**[[Antivirus software]]
 
**[[Secure coding]]
 
**[[Secure by default]]
 
**[[Secure by design]]
 
***[[Misuse case]]
 
**[[Security-focused operating system|Secure operating systems]]
 
*[[Authentication]]
 
**[[Multi-factor authentication]]
 
*[[Authorization]]
 
*[[Data-centric security]]
 
*[[Encryption]]
 
*[[Firewall (computing)|Firewall]]
 
*[[Intrusion detection system]]
 
*[[Mobile secure gateway]]
 
*[[Runtime application self-protection|Runtime application self-protection (RASP)]]
 
 
|name = Information security
 
 
}}<noinclude>{{Documentation}}</noinclude>
 
}}<noinclude>{{Documentation}}</noinclude>

Latest revision as of 15:18, 13 February 2021

50px Template documentation[view] [edit] [history] [purge]

Usage