틀:Table:InformationSecurity

Table of Information Security

Related security categories

Computer security, Automotive security, Cybercrime (Cybersex trafficking, Computer fraud), Cybergeddon, Cyberterrorism, Cyberwarfare, Electronic warfare, Information warfare, Internet security, Mobile security, Network security, Copy protection, Digital rights management

Threats

Adware, Advanced persistent threat, Arbitrary code execution, Backdoors, Bombs (Fork, Logic, Time, Zip), Hardware backdoors, Code injection, Crimeware, Cross-site scripting, Cross-site leaks, DOM clobbering, History sniffing, Cryptojacking, Botnets, Data breach, Drive-by download, Browser Helper Objects, Viruses, Data scraping, Denial-of-service attack, Eavesdropping, Email fraud, Email spoofing, Exploits, Fraudulent dialers, Hacktivism, Infostealer, Insecure direct object reference, Keystroke loggers, Malware, Payload, Phishing (Voice), Polymorphic engine, Privilege escalation, Ransomware, Rootkits, Scareware, Shellcode, Spamming, Social engineering, Spyware, Software bugs, Trojan horses, Hardware Trojans, Remote access trojans, Vulnerability, Web shells, Wiper, Worms, SQL injection, Rogue security software, Zombie

Defenses

Application security (Secure coding, Secure by default, Secure by design (Misuse case)), Computer access control (Authentication, (Multi-factor authentication), Authorization), Computer security software (Antivirus software, Security-focused operating system), Data-centric security, Software obfuscation, Data masking, Encryption, Firewall, Intrusion detection system (Host-based intrusion detection system (HIDS), Anomaly detection), Information security management (Information risk management, Security information and event management (SIEM)) Runtime application self-protection, Site isolation