Phishing/Related Articles: Difference between revisions
< Phishing
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: Creating Related Articles subpage) |
No edit summary |
||
(3 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | <noinclude>{{subpages}}</noinclude> | ||
==Parent topics== | ==Parent topics== | ||
Line 16: | Line 16: | ||
{{r|Clandestine human-source intelligence}} | {{r|Clandestine human-source intelligence}} | ||
{{r|Deception}} | {{r|Deception}} | ||
{{r|Email}} | {{r|Email}} | ||
{{r|Information security}} | {{r|Information security}} | ||
Line 24: | Line 23: | ||
{{r|Website}} | {{r|Website}} | ||
{{Bot-created_related_article_subpage}} | |||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Mine (land warfare)}} | |||
{{r|Archive:Should authors share copyright with the Citizendium Foundation?}} | |||
{{r|Opportunistic encryption}} |
Latest revision as of 16:00, 3 October 2024
- See also changes related to Phishing, or pages that link to Phishing or to this page or whose text contains "Phishing".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Phishing. Needs checking by a human.
- Clandestine human-source intelligence [r]: Add brief definition or description
- Deception [r]: Add brief definition or description
- Email [r]: A method of composing, sending, storing, and receiving messages over electronic communication systems. [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
- Simple Mail Transfer Protocol [r]: In the Internet Protocol Suite, SMTP is the basic method for transferring the "envelopes" of electronic mail among servers performing the electronic "post office" function, not the user mailbox function. [e]
- Social engineering [r]: Subverting a security system by deceiving its users. [e]
- Website [r]: A collection of pages that provide content. [e]
- Mine (land warfare) [r]: Add brief definition or description
- Archive:Should authors share copyright with the Citizendium Foundation? [r]: Add brief definition or description
- Opportunistic encryption [r]: A technique whereby computers can set up their own encrypted connections, without any connection-specific setup by an administrator. [e]