Jump to content
Toggle sidebar
Search
Create account
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Talk
Contributions
Navigation
Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
Contribute
Help
Learn to edit
Community portal
Recent changes
Upload file
Tools
What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Wikidata item
Print/export
Download as PDF
Printable version
Languages
On this Wikipedia the language links are at the top of the page across from the article title.
Go to top
.
Toggle the table of contents
Template
:
Information security
15 languages
العربية
Azərbaycanca
বাংলা
Български
فارسی
한국어
हिन्दी
日本語
Oʻzbekcha/ўзбекча
Русский
Српски / srpski
Türkçe
Українська
Tiếng Việt
中文
Edit links
Template
Talk
English
Read
Edit
View history
More
Read
Edit
View history
From Wikipedia, the free encyclopedia
Part of a series on
Information security
Related security categories
Computer security
Automotive security
Cybercrime
Cybersex trafficking
Computer fraud
Cybergeddon
Cyberterrorism
Cyberwarfare
Electronic warfare
Information warfare
Internet security
Mobile security
Network security
Copy protection
Digital rights management
Threats
Adware
Advanced persistent threat
Arbitrary code execution
Backdoors
Hardware backdoors
Code injection
Crimeware
Cross-site scripting
Cryptojacking malware
Botnets
Data breach
Drive-by download
Browser helper objects
Viruses
Data scraping
Denial of service
Eavesdropping
Email fraud
Email spoofing
Exploits
Keyloggers
Logic bombs
Time bombs
Fork bombs
Zip bombs
Fraudulent dialers
Malware
Payload
Phishing
Polymorphic engine
Privilege escalation
Ransomware
Rootkits
Bootkits
Scareware
Shellcode
Spamming
Social engineering
Screen scraping
Spyware
Software bugs
Trojan horses
Hardware Trojans
Remote access trojans
Vulnerability
Web shells
Wiper
Worms
SQL injection
Rogue security software
Zombie
Defenses
Application security
Secure coding
Secure by default
Secure by design
Misuse case
Computer access control
Authentication
Multi-factor authentication
Authorization
Computer security software
Antivirus software
Security-focused operating system
Data-centric security
Code obfuscation
Data masking
Encryption
Firewall
Intrusion detection system
Host-based intrusion detection system
(HIDS)
Anomaly detection
Security information and event management
(SIEM)
Mobile secure gateway
Runtime application self-protection
v
t
e
Template documentation
[
view
] [
edit
] [
history
] [
purge
]
The above
documentation
is
transcluded
from
Template:Information security/doc
.
(
edit
|
history
)
Editors can experiment in this template's sandbox
(
create
|
mirror
)
and testcases
(
create
)
pages.
Add categories to the
/doc
subpage.
Subpages of this template
.
Categories
:
Computer security templates
Computing sidebar templates