Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Idumont m |
imported>Idumont m |
||
| Line 16: | Line 16: | ||
*[[Cyberwarfare]] | *[[Cyberwarfare]] | ||
*[[Information security]] | *[[Information security]] | ||
| − | |||
*[[Mobile security]] | *[[Mobile security]] | ||
*[[Network security]] | *[[Network security]] | ||
| Line 48: | Line 47: | ||
**[[Two-factor authentication]] | **[[Two-factor authentication]] | ||
*[[Authorization]] | *[[Authorization]] | ||
| + | *[[Data-centric security]] | ||
*[[Firewall (computing)]] | *[[Firewall (computing)]] | ||
*[[Intrusion detection system]] | *[[Intrusion detection system]] | ||
Revision as of 02:05, 19 November 2015
| This article is part of a series on |
| Computer security |
|---|
|
| Related security categories |
| Threats |
| Defenses |
File:Test Template Info-Icon - Version (2).svg Template documentation[view] [edit] [history] [purge]
Usage
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |