Miscreant/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: Creating Related Articles subpage) |
imported>Housekeeping Bot m (Automated edit: Adding CZ:Workgroups to Category:Bot-created Related Articles subpages) |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | <noinclude>{{subpages}}</noinclude> | ||
==Parent topics== | ==Parent topics== | ||
Line 30: | Line 30: | ||
{{r|Worm (computers)}} | {{r|Worm (computers)}} | ||
{{Bot-created_related_article_subpage}} | |||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> |
Revision as of 18:35, 11 January 2010
- See also changes related to Miscreant, or pages that link to Miscreant or to this page or whose text contains "Miscreant".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Miscreant. Needs checking by a human.
- Amplification attack [r]: A means of denying service from computers, networks, or both, not by the direct volume or resource consumption of the attack stimulus itself, but by the volume of responses that it generates [e]
- Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
- Domain Name System security [r]: A set of extensions to the Domain Name System to protect it from security threats known at the time [e]
- Domain Name System [r]: The Internet service which translates to and from IP addresses and domain names. [e]
- Global Information Grid [r]: Add brief definition or description
- Honeypot [r]: A hardened but isolated component of a network or computer, which is intended to be attractive to miscreants and invite attacks, with the goals of early warning and diverting the attack from critical resources [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
- Massachusetts Institute of Technology [r]: A private research university in Cambridge, Massachusetts with a strong emphasis on scientific and technological research. [e]
- Resource attack [r]: Malware that overwhelms processing, memory, or network resources of a computer system by sending large numbers requests that appear legitimate, but at a high rate or in some manner crafted to make resources unavailable [e]
- Sinkhole (Computer network) [r]: Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed with appropriate forensics and diagnostics [e]
- Sinkhole (computers) [r]: A network element, or set of network elements, to which suspect or confirmed attacking traffic is diverted, both for protecting the production network and for planning and executing a specific defense [e]
- Transmission Control Protocol [r]: (TCP) A protocol that reliably delivers bytes across an internet. As long as the connection is up, bytes will be delivered without bit errors and in the order they were sent. It does not guarantee latency. [e]
- Value of networks [r]: Add brief definition or description
- Worm (computers) [r]: A form of malware that can spread, among networked computers, without human interaction. [e]
Categories:
- Subpages
- Related Article Subpages
- Computers Related Article Subpages
- Sociology Related Article Subpages
- Law Related Article Subpages
- All Content
- Computers Content
- Sociology Content
- Law Content
- Security tag
- Bot-created Related Articles subpages
- Computers Bot-created Related Articles subpages
- Sociology Bot-created Related Articles subpages
- Law Bot-created Related Articles subpages