Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Asartea m (Reverted edits by 109.96.26.48 (talk) (HG) (3.4.10)) |
|||
| Line 1: | Line 1: | ||
| − | + | {{ sidebar | |
| + | | name = Information security | ||
| + | | pretitle = Part of a series on | ||
| + | | title = [[Information security]] | ||
| + | | class = hlist | ||
| − | + | | heading2 = Related security categories | |
| − | + | | content2 = | |
| − | + | * [[Automotive security]] | |
| + | * [[Cybercrime]] | ||
| + | ** [[Cybersex trafficking]] | ||
| + | ** [[Computer fraud]] | ||
| + | * [[Cyberwarfare]] | ||
| + | * [[Internet security]] | ||
| + | * [[Mobile security]] | ||
| + | * [[Network security]] | ||
| − | + | | heading3 = Threats | |
| − | + | | content3 = | |
| + | * [[Advanced persistent threat]] | ||
| + | * [[Backdoor (computing)|Backdoor]] | ||
| + | * [[Computer crime]] | ||
| + | * [[Computer virus|Viruses]] | ||
| + | * [[Denial of service]] | ||
| + | * [[Eavesdropping]] | ||
| + | * [[Exploit (computer security)|Exploit]] | ||
| + | * [[Keylogger]]s | ||
| + | * [[Logic bomb]]s | ||
| + | * [[Malware]] | ||
| + | * [[Payload (computing)|Payload]] | ||
| + | * [[Phishing]] | ||
| + | * [[Ransomware]] | ||
| + | * [[Rootkit]] | ||
| + | * [[Screen scrape|Screen scrapers]] | ||
| + | * [[Spyware]] | ||
| + | * [[Trojan horse (computing)|Trojan horse]] | ||
| + | * [[Vulnerability (computing)|Vulnerability]] | ||
| + | * [[Web shell]]s | ||
| + | * [[Web application security]] | ||
| + | * [[Computer worm|Worms]] | ||
| + | * [[SQL injection]] | ||
| − | + | | heading4 = Defenses | |
| − | + | | content4 = | |
| + | * [[Computer access control]] | ||
| + | * [[Application security]] | ||
| + | ** [[Antivirus software]] | ||
| + | ** [[Secure coding]] | ||
| + | ** [[Secure by default]] | ||
| + | ** [[Secure by design]] | ||
| + | *** [[Misuse case]] | ||
| + | ** [[Security-focused operating system]] | ||
| + | * [[Authentication]] | ||
| + | ** [[Multi-factor authentication]] | ||
| + | * [[Authorization]] | ||
| + | * [[Data-centric security]] | ||
| + | * [[Encryption]] | ||
| + | * [[Firewall (computing)|Firewall]] | ||
| + | * [[Intrusion detection system]] | ||
| + | * [[Mobile secure gateway]] | ||
| + | * [[Runtime application self-protection]] | ||
| − | + | }}<noinclude>{{Documentation}}</noinclude> | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
Revision as of 11:40, 12 December 2020
| Part of a series on |
| Information security |
|---|
| Related security categories |
| Threats |
| Defenses |
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |