Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Oranjelo100 |
imported>Oranjelo100 |
||
| (46 intermediate revisions by the same user not shown) | |||
| Line 12: | Line 12: | ||
** [[Computer fraud]] | ** [[Computer fraud]] | ||
* [[Cyberwarfare]] | * [[Cyberwarfare]] | ||
| + | * [[Electronic warfare]] | ||
| + | * [[Information warfare]] | ||
* [[Internet security]] | * [[Internet security]] | ||
* [[Mobile security]] | * [[Mobile security]] | ||
* [[Network security]] | * [[Network security]] | ||
| + | * [[Copy protection]] | ||
| + | * [[Digital rights management]] | ||
| heading3 = Threats | | heading3 = Threats | ||
| content3 = | | content3 = | ||
| + | * [[Adware]] | ||
* [[Advanced persistent threat]] | * [[Advanced persistent threat]] | ||
| − | * [[Backdoor (computing)| | + | * [[Arbitrary code execution]] |
| + | * [[Backdoor (computing)|Backdoors]] | ||
| + | * [[Hardware backdoors]] | ||
| + | * [[Code injection]] | ||
| + | * [[Crimeware]] | ||
| + | * [[Cross-site scripting]] | ||
| + | * [[Cryptojacking malware]] | ||
| + | * [[Botnet]]s | ||
| + | * [[Data breach]] | ||
| + | * [[Drive-by download]] | ||
| + | * [[Malware]] [[browser helper object]]s | ||
* [[Computer crime]] | * [[Computer crime]] | ||
* [[Computer virus|Viruses]] | * [[Computer virus|Viruses]] | ||
| + | * [[Data scraping]] | ||
* [[Denial of service]] | * [[Denial of service]] | ||
* [[Eavesdropping]] | * [[Eavesdropping]] | ||
| − | * [[Exploit (computer security)| | + | * [[Email fraud]] |
| + | * [[Email spoofing]] | ||
| + | * [[Exploit (computer security)|Exploits]] | ||
* [[Keylogger]]s | * [[Keylogger]]s | ||
* [[Logic bomb]]s | * [[Logic bomb]]s | ||
| − | * [[Time bomb (software)|Time bomb]] | + | * [[Time bomb (software)|Time bombs]] |
| + | * [[Fork bomb]]s | ||
| + | * [[dialer#Fraudulent dialer|Fraudulent dialers]] | ||
* [[Malware]] | * [[Malware]] | ||
* [[Payload (computing)|Payload]] | * [[Payload (computing)|Payload]] | ||
* [[Phishing]] | * [[Phishing]] | ||
| + | * [[Polymorphic engine]] | ||
| + | * [[Privilege escalation]] | ||
* [[Ransomware]] | * [[Ransomware]] | ||
| − | * [[Rootkit]] | + | * [[Rootkit]]s |
| − | * [[Screen scrape|Screen | + | * [[Bootkit]]s |
| + | * [[Scareware]] | ||
| + | * [[Shellcode]] | ||
| + | * [[Spamming]] | ||
| + | * [[Screen scrape|Screen scraping]] | ||
* [[Spyware]] | * [[Spyware]] | ||
| − | * [[Trojan horse (computing)|Trojan | + | * [[Software bug]]s |
| + | * [[Trojan horse (computing)|Trojan horses]] | ||
| + | * [[Hardware Trojan]]s | ||
| + | * [[Remote access trojan]]s | ||
* [[Vulnerability (computing)|Vulnerability]] | * [[Vulnerability (computing)|Vulnerability]] | ||
* [[Web shell]]s | * [[Web shell]]s | ||
| − | * [[ | + | * [[Wiper (malware)|Wiper]] |
* [[Computer worm|Worms]] | * [[Computer worm|Worms]] | ||
* [[SQL injection]] | * [[SQL injection]] | ||
| + | * [[Rogue security software]] | ||
| + | * [[Zombie (computing)|Zombie]] | ||
| heading4 = Defenses | | heading4 = Defenses | ||
| content4 = | | content4 = | ||
| + | * [[Anomaly detection]] | ||
* [[Computer access control]] | * [[Computer access control]] | ||
* [[Application security]] | * [[Application security]] | ||
** [[Antivirus software]] | ** [[Antivirus software]] | ||
| + | ** [[Computer security software]] | ||
** [[Secure coding]] | ** [[Secure coding]] | ||
** [[Secure by default]] | ** [[Secure by default]] | ||
| Line 56: | Line 89: | ||
* [[Authorization]] | * [[Authorization]] | ||
* [[Data-centric security]] | * [[Data-centric security]] | ||
| + | * [[Code obfuscation]] | ||
* [[Encryption]] | * [[Encryption]] | ||
* [[Firewall (computing)|Firewall]] | * [[Firewall (computing)|Firewall]] | ||
* [[Intrusion detection system]] | * [[Intrusion detection system]] | ||
| + | ** [[Host-based intrusion detection system]] (HIDS) | ||
| + | * [[Security information and event management]] | ||
* [[Mobile secure gateway]] | * [[Mobile secure gateway]] | ||
* [[Runtime application self-protection]] | * [[Runtime application self-protection]] | ||
| + | * [[Web application security]] | ||
}}<noinclude>{{Documentation}}</noinclude> | }}<noinclude>{{Documentation}}</noinclude> | ||
Latest revision as of 15:18, 13 February 2021
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |