Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Thumperward (merged) |
imported>Oranjelo100 |
||
| (50 intermediate revisions by 4 users not shown) | |||
| Line 1: | Line 1: | ||
| − | {{sidebar | + | {{ sidebar |
| − | | pretitle = | + | | name = Information security |
| − | |title = [[Information security]] | + | | pretitle = Part of a series on |
| − | | | + | | title = [[Information security]] |
| − | + | | class = hlist | |
| − | |heading2 = Related security categories | + | | heading2 = Related security categories |
| − | | | + | | content2 = |
| − | + | * [[Automotive security]] | |
| + | * [[Cybercrime]] | ||
| + | ** [[Cybersex trafficking]] | ||
| + | ** [[Computer fraud]] | ||
| + | * [[Cyberwarfare]] | ||
| + | * [[Electronic warfare]] | ||
| + | * [[Information warfare]] | ||
| + | * [[Internet security]] | ||
| + | * [[Mobile security]] | ||
| + | * [[Network security]] | ||
| + | * [[Copy protection]] | ||
| + | * [[Digital rights management]] | ||
| − | *[[ | + | | heading3 = Threats |
| − | *[[ | + | | content3 = |
| − | **[[ | + | * [[Adware]] |
| − | **[[Computer fraud]] | + | * [[Advanced persistent threat]] |
| − | *[[ | + | * [[Arbitrary code execution]] |
| − | *[[ | + | * [[Backdoor (computing)|Backdoors]] |
| − | *[[ | + | * [[Hardware backdoors]] |
| − | *[[ | + | * [[Code injection]] |
| + | * [[Crimeware]] | ||
| + | * [[Cross-site scripting]] | ||
| + | * [[Cryptojacking malware]] | ||
| + | * [[Botnet]]s | ||
| + | * [[Data breach]] | ||
| + | * [[Drive-by download]] | ||
| + | * [[Malware]] [[browser helper object]]s | ||
| + | * [[Computer crime]] | ||
| + | * [[Computer virus|Viruses]] | ||
| + | * [[Data scraping]] | ||
| + | * [[Denial of service]] | ||
| + | * [[Eavesdropping]] | ||
| + | * [[Email fraud]] | ||
| + | * [[Email spoofing]] | ||
| + | * [[Exploit (computer security)|Exploits]] | ||
| + | * [[Keylogger]]s | ||
| + | * [[Logic bomb]]s | ||
| + | * [[Time bomb (software)|Time bombs]] | ||
| + | * [[Fork bomb]]s | ||
| + | * [[dialer#Fraudulent dialer|Fraudulent dialers]] | ||
| + | * [[Malware]] | ||
| + | * [[Payload (computing)|Payload]] | ||
| + | * [[Phishing]] | ||
| + | * [[Polymorphic engine]] | ||
| + | * [[Privilege escalation]] | ||
| + | * [[Ransomware]] | ||
| + | * [[Rootkit]]s | ||
| + | * [[Bootkit]]s | ||
| + | * [[Scareware]] | ||
| + | * [[Shellcode]] | ||
| + | * [[Spamming]] | ||
| + | * [[Screen scrape|Screen scraping]] | ||
| + | * [[Spyware]] | ||
| + | * [[Software bug]]s | ||
| + | * [[Trojan horse (computing)|Trojan horses]] | ||
| + | * [[Hardware Trojan]]s | ||
| + | * [[Remote access trojan]]s | ||
| + | * [[Vulnerability (computing)|Vulnerability]] | ||
| + | * [[Web shell]]s | ||
| + | * [[Wiper (malware)|Wiper]] | ||
| + | * [[Computer worm|Worms]] | ||
| + | * [[SQL injection]] | ||
| + | * [[Rogue security software]] | ||
| + | * [[Zombie (computing)|Zombie]] | ||
| − | | | + | | heading4 = Defenses |
| − | | | + | | content4 = |
| − | + | * [[Anomaly detection]] | |
| − | *[[ | + | * [[Computer access control]] |
| − | *[[ | + | * [[Application security]] |
| − | *[[ | + | ** [[Antivirus software]] |
| − | *[[ | + | ** [[Computer security software]] |
| − | *[[ | + | ** [[Secure coding]] |
| − | *[[ | + | ** [[Secure by default]] |
| − | *[[ | + | ** [[Secure by design]] |
| − | *[[ | + | *** [[Misuse case]] |
| − | *[[ | + | ** [[Security-focused operating system]] |
| − | *[[ | + | * [[Authentication]] |
| − | *[[ | + | ** [[Multi-factor authentication]] |
| − | *[[ | + | * [[Authorization]] |
| − | *[[ | + | * [[Data-centric security]] |
| − | *[[ | + | * [[Code obfuscation]] |
| − | *[[ | + | * [[Encryption]] |
| − | *[[ | + | * [[Firewall (computing)|Firewall]] |
| − | *[[ | + | * [[Intrusion detection system]] |
| − | *[[ | + | ** [[Host-based intrusion detection system]] (HIDS) |
| − | *[[ | + | * [[Security information and event management]] |
| − | *[[ | + | * [[Mobile secure gateway]] |
| − | *[[ | + | * [[Runtime application self-protection]] |
| − | *[[ | + | * [[Web application security]] |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
}}<noinclude>{{Documentation}}</noinclude> | }}<noinclude>{{Documentation}}</noinclude> | ||
Latest revision as of 15:18, 13 February 2021
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |