Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Timtempleton (Changed the header to alert the reader that the article is part of a series) |
imported>Timtempleton (Fixed order of defense topics) |
||
| Line 40: | Line 40: | ||
*[[Application security]] | *[[Application security]] | ||
**[[Antivirus software]] | **[[Antivirus software]] | ||
| + | **[[Secure coding]] | ||
| + | **[[Security by design]] | ||
| + | **[[Security-focused operating system|Secure operating systems]] | ||
*[[Authentication]] | *[[Authentication]] | ||
**[[Two-factor authentication]] | **[[Two-factor authentication]] | ||
**[[Multi-factor authentication]] | **[[Multi-factor authentication]] | ||
*[[Authorization]] | *[[Authorization]] | ||
| − | |||
| − | |||
| − | |||
*[[Firewall (computing)]] | *[[Firewall (computing)]] | ||
*[[Intrusion detection system]] | *[[Intrusion detection system]] | ||
Revision as of 23:02, 24 April 2014
| This article is part of a series on |
| Computer security |
|---|
|
| Related security categories |
| Threats |
| Defenses |
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |