Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Saurabh.khare1000 |
imported>FrescoBot m (Bot: links syntax) |
||
| Line 13: | Line 13: | ||
|header6 = [[Computer insecurity]] | |header6 = [[Computer insecurity]] | ||
|label7 = [[Vulnerability (computing)|Vulnerability]] | |label7 = [[Vulnerability (computing)|Vulnerability]] | ||
| − | |data7 = [[Social engineering (security)|Social engineering]]<br />[[ | + | |data7 = [[Social engineering (security)|Social engineering]]<br />[[Eavesdropping]] |
|label8 = [[Exploit (computer security)|Exploits]] | |label8 = [[Exploit (computer security)|Exploits]] | ||
|data8 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|Viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | |data8 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|Viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | ||
Revision as of 06:18, 4 April 2011
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |