Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
Line 11: | Line 11: | ||
|header5 = [[Computer insecurity]] | |header5 = [[Computer insecurity]] | ||
|label6 = [[Vulnerability (computing)|Vulnerability]] | |label6 = [[Vulnerability (computing)|Vulnerability]] | ||
− | |data6 = | + | |data6 = [[Eavesdropping]] |
|label7 = [[Exploit (computer security)|Exploits]] | |label7 = [[Exploit (computer security)|Exploits]] | ||
|data7 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|Viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | |data7 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|Viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | ||
|label8 = [[Payload (computing)|Payloads]] | |label8 = [[Payload (computing)|Payloads]] | ||
− | |data8 = | + | |data8 = [[Rootkit]]s<br />[[Keylogger]]s |
}}<noinclude>[[ar:قالب:أمن الحاسوب]]{{Documentation}}</noinclude> | }}<noinclude>[[ar:قالب:أمن الحاسوب]]{{Documentation}}</noinclude> |
Revision as of 16:11, 10 December 2012
Computer security | |
---|---|
Secure operating systems | |
Security by design | |
Secure coding | |
Computer insecurity | |
Vulnerability | Eavesdropping |
Exploits | Trojans Viruses and worms Denial of service |
Payloads | Rootkits Keyloggers |
The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |