Phishing/Related Articles: Difference between revisions
< Phishing
Jump to navigation
Jump to search
Pat Palmer (talk | contribs) mNo edit summary |
No edit summary |
||
Line 25: | Line 25: | ||
{{Bot-created_related_article_subpage}} | {{Bot-created_related_article_subpage}} | ||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Mine (land warfare)}} | |||
{{r|Archive:Should authors share copyright with the Citizendium Foundation?}} | |||
{{r|Opportunistic encryption}} |
Latest revision as of 16:00, 3 October 2024
- See also changes related to Phishing, or pages that link to Phishing or to this page or whose text contains "Phishing".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Phishing. Needs checking by a human.
- Clandestine human-source intelligence [r]: Add brief definition or description
- Deception [r]: Add brief definition or description
- Email [r]: A method of composing, sending, storing, and receiving messages over electronic communication systems. [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
- Simple Mail Transfer Protocol [r]: In the Internet Protocol Suite, SMTP is the basic method for transferring the "envelopes" of electronic mail among servers performing the electronic "post office" function, not the user mailbox function. [e]
- Social engineering [r]: Subverting a security system by deceiving its users. [e]
- Website [r]: A collection of pages that provide content. [e]
- Mine (land warfare) [r]: Add brief definition or description
- Archive:Should authors share copyright with the Citizendium Foundation? [r]: Add brief definition or description
- Opportunistic encryption [r]: A technique whereby computers can set up their own encrypted connections, without any connection-specific setup by an administrator. [e]