<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wikimd.org/index.php?action=history&amp;feed=atom&amp;title=Template%3AInformation_security</id>
	<title>Template:Information security - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wikimd.org/index.php?action=history&amp;feed=atom&amp;title=Template%3AInformation_security"/>
	<link rel="alternate" type="text/html" href="https://wikimd.org/index.php?title=Template:Information_security&amp;action=history"/>
	<updated>2026-04-26T15:07:49Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.2</generator>
	<entry>
		<id>https://wikimd.org/index.php?title=Template:Information_security&amp;diff=5763659&amp;oldid=prev</id>
		<title>Prab: 1 revision imported</title>
		<link rel="alternate" type="text/html" href="https://wikimd.org/index.php?title=Template:Information_security&amp;diff=5763659&amp;oldid=prev"/>
		<updated>2024-05-12T22:05:07Z</updated>

		<summary type="html">&lt;p&gt;1 revision imported&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Navbox&lt;br /&gt;
| name       = Information security&lt;br /&gt;
| title      = [[Information security]]&lt;br /&gt;
| listclass  = hlist&lt;br /&gt;
| state      = {{{state|}}}&lt;br /&gt;
| image      = [[File:CIAJMK1209-en.svg|vectorial version|center|150px]]&lt;br /&gt;
&lt;br /&gt;
| group1     = Related security categories&lt;br /&gt;
| list1      =&lt;br /&gt;
* [[Computer security]]&lt;br /&gt;
* [[Automotive security]]&lt;br /&gt;
* [[Cybercrime]]&lt;br /&gt;
** [[Cybersex trafficking]]&lt;br /&gt;
** [[Computer fraud]]&lt;br /&gt;
* [[Cybergeddon]]&lt;br /&gt;
* [[Cyberterrorism]]&lt;br /&gt;
* [[Cyberwarfare]]&lt;br /&gt;
* [[Electromagnetic warfare]]&lt;br /&gt;
* [[Information warfare]]&lt;br /&gt;
* [[Internet security]]&lt;br /&gt;
* [[Mobile security]]&lt;br /&gt;
* [[Network security]]&lt;br /&gt;
* [[Copy protection]]&lt;br /&gt;
* [[Digital rights management]]&lt;br /&gt;
&lt;br /&gt;
| group2     = [[Threat (computer)|Threats]]&lt;br /&gt;
| list2      =&lt;br /&gt;
&lt;br /&gt;
* [[Adware]]&lt;br /&gt;
* [[Advanced persistent threat]]&lt;br /&gt;
* [[Arbitrary code execution]]&lt;br /&gt;
* [[Backdoor (computing)|Backdoors]]&lt;br /&gt;
* [[Hardware backdoor]]s&lt;br /&gt;
* [[Code injection]]&lt;br /&gt;
* [[Crimeware]]&lt;br /&gt;
* [[Cross-site scripting]]&lt;br /&gt;
* [[Cross-site leaks]]&lt;br /&gt;
* [[DOM clobbering]]&lt;br /&gt;
* [[History sniffing]]&lt;br /&gt;
* [[Cryptojacking]]&lt;br /&gt;
* [[Botnet]]s&lt;br /&gt;
* [[Data breach]]&lt;br /&gt;
* [[Drive-by download]]&lt;br /&gt;
* [[Browser Helper Object]]s&lt;br /&gt;
* [[Computer virus|Viruses]]&lt;br /&gt;
* [[Data scraping]]&lt;br /&gt;
* [[Denial-of-service attack]]&lt;br /&gt;
* [[Eavesdropping]]&lt;br /&gt;
* [[Email fraud]]&lt;br /&gt;
* [[Email spoofing]]&lt;br /&gt;
* [[Exploit (computer security)|Exploits]]&lt;br /&gt;
* [[Hacktivism]]&lt;br /&gt;
* [[Insecure direct object reference]]&lt;br /&gt;
* [[Keystroke logging|Keystroke loggers]]&lt;br /&gt;
* [[Logic bomb]]s&lt;br /&gt;
* [[Time bomb (software)|Time bombs]]&lt;br /&gt;
* [[Fork bomb]]s&lt;br /&gt;
* [[Zip bomb]]s&lt;br /&gt;
* [[dialer#Fraudulent dialer|Fraudulent dialers]]&lt;br /&gt;
* [[Malware]]&lt;br /&gt;
* [[Payload (computing)|Payload]]&lt;br /&gt;
* [[Phishing]] &lt;br /&gt;
** [[Voice phishing|Voice]] &lt;br /&gt;
* [[Polymorphic engine]]&lt;br /&gt;
* [[Privilege escalation]]&lt;br /&gt;
* [[Ransomware]]&lt;br /&gt;
* [[Rootkit]]s&lt;br /&gt;
* [[Scareware]]&lt;br /&gt;
* [[Shellcode]]&lt;br /&gt;
* [[Spamming]]&lt;br /&gt;
* [[Social engineering (security)|Social engineering]]&lt;br /&gt;
* [[Spyware]]&lt;br /&gt;
* [[Software bug]]s&lt;br /&gt;
* [[Trojan horse (computing)|Trojan horses]]&lt;br /&gt;
* [[Hardware Trojan]]s&lt;br /&gt;
* [[Remote access trojan]]s&lt;br /&gt;
* [[Vulnerability (computing)|Vulnerability]]&lt;br /&gt;
* [[Web shell]]s&lt;br /&gt;
* [[Wiper (malware)|Wiper]]&lt;br /&gt;
* [[Computer worm|Worms]]&lt;br /&gt;
* [[SQL injection]]&lt;br /&gt;
* [[Rogue security software]]&lt;br /&gt;
* [[Zombie (computing)|Zombie]]&lt;br /&gt;
&lt;br /&gt;
| group3     = Defenses&lt;br /&gt;
| list3      =&lt;br /&gt;
&lt;br /&gt;
* [[Application security]]&lt;br /&gt;
** [[Secure coding]]&lt;br /&gt;
** [[Secure by default]]&lt;br /&gt;
** [[Secure by design]]&lt;br /&gt;
*** [[Misuse case]]&lt;br /&gt;
* [[Computer access control]]&lt;br /&gt;
** [[Authentication]]&lt;br /&gt;
*** [[Multi-factor authentication]]&lt;br /&gt;
** [[Authorization]]&lt;br /&gt;
* [[Computer security software]]&lt;br /&gt;
** [[Antivirus software]]&lt;br /&gt;
** [[Security-focused operating system]]&lt;br /&gt;
* [[Data-centric security]]&lt;br /&gt;
* [[Code obfuscation|Obfuscation (software)]]&lt;br /&gt;
* [[Data masking]]&lt;br /&gt;
* [[Encryption]]&lt;br /&gt;
* [[Firewall (computing)|Firewall]]&lt;br /&gt;
* [[Intrusion detection system]]&lt;br /&gt;
** [[Host-based intrusion detection system]] (HIDS)&lt;br /&gt;
** [[Anomaly detection]]&lt;br /&gt;
* [[Security information and event management]] (SIEM)&lt;br /&gt;
* [[Mobile secure gateway]]&lt;br /&gt;
* [[Runtime application self-protection]]&lt;br /&gt;
* [[Site isolation]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{Documentation}}&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Prab</name></author>
	</entry>
</feed>