Category:Computer security procedures: Difference between revisions
Appearance
Content deleted Content added
m typo: plural to singular: ´these category contains´ --> ´this category contains´ |
removed Category:Procedural knowledge using HotCat not related to the psychological concept |
||
(3 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
{{Portal|Computer security}} |
|||
{{catdiffuse}} |
{{catdiffuse}} |
||
Line 5: | Line 4: | ||
[[Category:Computer security|Procedures]] |
[[Category:Computer security|Procedures]] |
||
[[Category:Procedural knowledge]] |
|||
[[fr:Catégorie:Procédure de sécurité informatique]] |
Latest revision as of 00:57, 9 May 2023
![]() | Pages in this category should be moved to subcategories where applicable. This category may require frequent maintenance to avoid becoming too large. It should directly contain very few, if any, pages and should mainly contain subcategories. |
This category contains articles on computer security procedures including strategies, guidelines, policies, standards, specifications, regulations and laws.
Subcategories
This category has the following 4 subcategories, out of 4 total.
Pages in category "Computer security procedures"
The following 75 pages are in this category, out of 75 total. This list may not reflect recent changes.
C
- CBL Index
- CESG Claims Tested Mark
- Chroot
- Code sanitizer
- Commercial Product Assurance
- Common Criteria Testing Laboratory
- Composite Blocking List
- Computer forensics
- Computer security policy
- Computer Underground Digest
- Coordinated vulnerability disclosure
- Cryptographic Module Testing Laboratory
- Cyber resilience
- Control system security
- Cyber spying
- Cyber threat hunting
- Cyber-security regulation
- Information security standards
- Cyberwarfare