Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>GliderMaven (Revert to revision 987048411 dated 2020-11-04 15:52:00 by 82.17.189.217 using popups) |
imported>Thumperward (merged) |
||
| Line 23: | Line 23: | ||
*[[Advanced persistent threat]] | *[[Advanced persistent threat]] | ||
*[[Backdoor (computing)|Backdoors]] | *[[Backdoor (computing)|Backdoors]] | ||
| − | |||
*[[Computer crime]] | *[[Computer crime]] | ||
*[[Computer virus|Viruses]] | *[[Computer virus|Viruses]] | ||
| Line 35: | Line 34: | ||
*[[Phishing]] | *[[Phishing]] | ||
*[[Ransomware]] | *[[Ransomware]] | ||
| − | *[[Rootkit]] | + | *[[Rootkit]] |
*[[Screen scrape|Screen scrapers]] | *[[Screen scrape|Screen scrapers]] | ||
*[[Spyware]] | *[[Spyware]] | ||
Revision as of 20:07, 1 December 2020
| This article is part of a series on |
| Information security |
|---|
| Related security categories |
| Threats |
| Defenses |
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |