Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Bobrayner (plus one) |
imported>Timtempleton (Revised and updated the computer security template as a way of highlighting the need to synch and merge different content. Removed computer insecurity which is a redirect to the computer security listing.) |
||
| Line 1: | Line 1: | ||
{{sidebar | {{sidebar | ||
| − | |title = | + | |title = Computer security |
|titlestyle = background:#ffc0c0 | |titlestyle = background:#ffc0c0 | ||
|headingstyle = background:#ffc0c0; font-size:larger | |headingstyle = background:#ffc0c0; font-size:larger | ||
| − | |heading1 = | + | |heading1 = |
| − | |content1 = | + | |content1style = text-align:left |
| + | |content1 = | ||
| + | *[[Computer security]] (main article) | ||
| + | |||
| + | |heading2 = Related security categories | ||
| + | |content2style = text-align:left | ||
| + | |content2 = | ||
| + | *[[Cybersecurity]] | ||
*[[Information security]] | *[[Information security]] | ||
| − | *[[ | + | *[[Mobile security]] |
| − | *[[ | + | *[[Network security]] |
| − | *[[ | + | *[[World Wide Web#Security|World Wide Web Security]] |
| − | |||
| − | | | + | |heading3 = Threats |
| − | | | + | |content3style = text-align:left |
| − | | | + | |content3 = |
*[[Vulnerability (computing)|Vulnerability]] | *[[Vulnerability (computing)|Vulnerability]] | ||
**[[Eavesdropping]] | **[[Eavesdropping]] | ||
| Line 21: | Line 27: | ||
**[[Computer virus|Viruses]] and [[Computer worm|worms]] | **[[Computer virus|Viruses]] and [[Computer worm|worms]] | ||
**[[Denial of service]] | **[[Denial of service]] | ||
| + | **[[Malware]] | ||
*[[Payload (computing)|Payloads]] | *[[Payload (computing)|Payloads]] | ||
**[[Rootkit]]s | **[[Rootkit]]s | ||
**[[Keylogger]]s | **[[Keylogger]]s | ||
| + | |||
| + | |heading4 = Defenses | ||
| + | |content4style = text-align:left | ||
| + | |content4 = | ||
| + | *[[Access Control Systems]] | ||
| + | *[[Application security]] | ||
| + | **[[Antivirus software]] | ||
| + | *[[Authentication]] | ||
| + | **[[Two-factor authentication]] | ||
| + | **[[Multi-factor authentication]] | ||
| + | *[[Authorization]] | ||
| + | **[[Secure coding]] | ||
| + | **[[Security by design]] | ||
| + | **[[Security-focused operating system|Secure operating systems]] | ||
| + | *[[Firewall (computing)]] | ||
| + | *[[Intrusion detection system]] | ||
| + | *[[Intrusion prevention system]] | ||
|name = Computer security | |name = Computer security | ||
}}<noinclude>{{Documentation}} | }}<noinclude>{{Documentation}} | ||
</noinclude> | </noinclude> | ||
Revision as of 22:11, 24 April 2014
| Computer security |
|---|
|
| Related security categories |
| Threats |
| Defenses |
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |