Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>JaGa m (Disambiguated: Secure operating systems → Security-focused operating system) |
imported>Whouk (rm deleted article) |
||
| Line 6: | Line 6: | ||
|data2 = [[Security-focused operating system|Secure operating systems]] | |data2 = [[Security-focused operating system|Secure operating systems]] | ||
|label3 = | |label3 = | ||
| − | |data3 = [[Security | + | |data3 = [[Security by design]] |
|label4 = | |label4 = | ||
| − | |data4 | + | |data4 = [[Secure coding]] |
| − | + | |header5 = [[Computer insecurity]] | |
| − | + | |label6 = [[Vulnerability (computing)|Vulnerability]] | |
| − | | | + | |data6 = [[Social engineering (security)|Social engineering]]<br />[[Eavesdropping]] |
| − | | | + | |label7 = [[Exploit (computer security)|Exploits]] |
| − | | | + | |data7 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|Viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] |
| − | | | + | |label8 = [[Payload (computing)|Payloads]] |
| − | | | + | |data8 = [[Backdoor (computing)|Backdoors]]<br />[[Rootkit]]s<br />[[Keylogger]]s |
| − | | | ||
| − | | | ||
}}<noinclude>[[ar:قالب:أمن الحاسوب]]{{Documentation}}</noinclude> | }}<noinclude>[[ar:قالب:أمن الحاسوب]]{{Documentation}}</noinclude> | ||
Revision as of 12:20, 31 May 2012
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |