Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Svick m (rm newline) |
imported>Zarcillo m (change "exploit" (verb) to "exploitation" (noun)) |
||
| Line 14: | Line 14: | ||
|label7 = [[Vulnerability (computing)|Vulnerability]] | |label7 = [[Vulnerability (computing)|Vulnerability]] | ||
|data7 = [[Social engineering (security)|Social engineering]]<br />[[Man-in-the-middle attack|Eavesdropping]] | |data7 = [[Social engineering (security)|Social engineering]]<br />[[Man-in-the-middle attack|Eavesdropping]] | ||
| − | |label8 = [[ | + | |label8 = [[Exploitation (computer security)|Exploitation]] |
|data8 = [[Trojan horse (computing)|Trojan]]<br />[[Computer virus|viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | |data8 = [[Trojan horse (computing)|Trojan]]<br />[[Computer virus|viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | ||
|label9 = [[Payload (software)|Payload]] | |label9 = [[Payload (software)|Payload]] | ||
|data9 = [[Backdoor (computing)|Backdoor]]<br />[[Rootkit]]<br />[[Keylogger]] | |data9 = [[Backdoor (computing)|Backdoor]]<br />[[Rootkit]]<br />[[Keylogger]] | ||
}}<noinclude>{{Documentation}}</noinclude> | }}<noinclude>{{Documentation}}</noinclude> | ||
Revision as of 13:05, 3 June 2010
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |