Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
| Line 1: | Line 1: | ||
| − | {{ | + | {{ |
| pretitle = This article is part of a series on | | pretitle = This article is part of a series on | ||
|title = [[Information security]] | |title = [[Information security]] | ||
Revision as of 08:56, 16 April 2020
{{ | pretitle = This article is part of a series on |title = Information security |titlestyle = background:#ffc0c0 |headingstyle = background:#ffc0c0; font-size:larger
|heading2 = Related security categories |content2style = text-align:left |content2 =
- Internet security
- Automotive security
- Cyberwarfare
- Computer security
- Mobile security
- Network security
|heading3 = Threats |content3style = text-align:left |content3 =
- Advanced persistent threat
- Computer crime
- Vulnerabilities
- Eavesdropping
- Malware
- Spyware
- Ransomware
- Trojans
- Viruses
- Worms
- Rootkits
- Bootkits
- Keyloggers
- Screen scrapers
- Exploits
- Backdoors
- Logic bombs
- Payloads
- Denial of service
- Web shells
- Web application security
- Phishing
|heading4 = Defenses |content4style = text-align:left |content4 =
- Computer access control
- Application security
- Authentication
- Authorization
- Data-centric security
- Encryption
- Firewall
- Intrusion detection system
- Mobile secure gateway
- Runtime application self-protection (RASP)
|name = Information security
}}
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |