Category:Computer security
Sari la navigare
Sari la căutare
English: Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
the protection of computer systems and networks from theft, damage or data leak | |||
Încarcă multimedia | |||
![]() | |||
Este un/o | industrie, disciplină academică | ||
---|---|---|---|
Subclasă a | Siguranță, Securitatea informației | ||
Parte din | Siguranță | ||
Constând în | |||
Considerat identic cu | digital security, cyber security | ||
| |||
![]() |
Subcategorii
Această categorie conține următoarele 43 de subcategorii, dintr-un total de 43.
*
+
A
B
C
D
E
H
I
J
K
L
N
O
P
R
S
T
U
V
Fișiere media din categoria „Computer security”
Următoarele 200 fișiere se află în această categorie, dintr-un total de 384.
(pagina anterioară) (pagina următoare)- 1140-PandaSecurity Logo LowRes.png 340x130; 5 KB
- 2Q15 Transaction - Protecting Your Children's Credit.pdf 1.275 × 1.650, 2 pagini; 222 KB
- 3wPlayer.jpg 517x405; 97 KB
- 4300 side.jpg 3.164x1.052; 745 KB
- Abdullah Al Imran 01.jpg 604x720; 225 KB
- Abdullah Al Imran.jpg 960x960; 570 KB
- ACARM-ng architecture.png 1.626x1.032; 172 KB
- ACARM-ng logo.svg 183x85; 35 KB
- ACARM-ng WUI alert time series 1.png 948x548; 60 KB
- ACARM-ng WUI sample alert 1.png 948x548; 86 KB
- Access Control List of Dokuwiki.jpg 928x565; 137 KB
- Aircrack-ng.png 626x413; 6 KB
- Angela Orebaugh profile.jpg 500x505; 55 KB
- ANSSI.jpg 410x120; 18 KB
- Application Threat Model PFD.jpg 842x440; 82 KB
- APT28 APT29 Techniques - Malware.png 1.431x805; 192 KB
- APT28 APT29 Techniques - Spearphising.png 1.431x805; 234 KB
- Arm partial screenshot.png 400x250; 76 KB
- Array for spraying.jpg 621x829; 149 KB
- Arslan ud Din Shafiq.jpg 1.323x1.148; 261 KB
- Aslr stack smash.svg 743x227; 36 KB
- Attaque par relais sur le protocole Echo.png 419x503; 36 KB
- Attaques.png 633x488; 67 KB
- AusweisApp.png 674x480; 45 KB
- Autentificare vs autorizare.PNG 717x485; 40 KB
- Auth ssh.png 639x311; 11 KB
- AVG wordmark.png 2.842x1.144; 45 KB
- Bbsteknoloji.svg 400x212; 115 KB
- BigFix logo.svg 200x67; 3 KB
- Bingo-Card.png 1.176x767; 106 KB
- BlackHoleAttack.jpg 815x568; 68 KB
- CapROS bear.png 99x88; 3 KB
- Carbon-Black-Web.png 974x964; 34 KB
- Cardboard “restricted viewing enclosure” -1.jpg 3.264x1.836; 1,22 MB
- Cardboard “restricted viewing enclosure” -2.jpg 3.264x1.836; 1,59 MB
- CC Paquet exigences fonctionnelles.jpg 714x1.088; 57 KB
- Ceh-eccouncil-authorized Training Center.JPG 100x72; 19 KB
- Certes Logo.PNG 2.100x825; 36 KB
- CHANGENAME LOGO.png 559x558; 379 KB
- Chaos Communication Camp 2007 - ftp telnet tshirt.JPG 3.456x2.304; 4,07 MB
- Cible De Sécurté Complétée.jpg 666x455; 52 KB
- CibleDeSecurtéCC.png 828x566; 43 KB
- CibleDeSecurtéComplétée.png 666x455; 260 KB
- Cisco CCNA VLANs Spark Databox.png 2.400x1.800; 1,01 MB
- CISO NETWORK .png 100x50; 3 KB
- Citeclogo vector big.png 732x449; 69 KB
- ClearShot diagram.png 789x262; 14 KB
- Clock-Based-OTP.png 512x254; 45 KB
- Cloud Computing (6648686983).jpg 350x248; 36 KB
- CMM Question Example.png 558x170; 7 KB
- CMM Question.png 361x133; 4 KB
- College memories of abhishek.jpg 1.040x492; 64 KB
- Common Criteria evaluation costs.png 699x373; 6 KB
- Comodo Cybersecurity.png 122x31; 4 KB
- Complexité mot de passe.png 800x600; 76 KB
- Computer locked.jpg 500x710; 91 KB
- Computer-security-emergency-response-process(high-res).png 2.601x5.307; 233 KB
- Computer-security-incident-initial-process(high-res).png 2.364x5.182; 121 KB
- Computer-security-incident-initial-process.png 379x830; 15 KB
- Computersicherheit.jpg 1.729x1.214; 155 KB
- ContentSecurityPolicy3 diagram.png 723x790; 61 KB
- Contremesure.png 1.256x782; 36 KB
- Cookie-cooking-de.svg 198x108; 2 KB
- Cookieeee.png 684x441; 92 KB
- Cryptors Website.png 1.352x675; 74 KB
- CS5L CMM in mature CS approach.png 606x432; 43 KB
- CS5L in mature approach cycle.png 813x613; 130 KB
- Cyber Czar Howard Schmidt meets Barack Obama.jpg 432x412; 19 KB
- Cyber security franchise.png 841x359; 131 KB
- Cyber threats for small and medium businesses.jpg 660x444; 80 KB
- Cyber threats in Russia.jpg 660x443; 104 KB
- Cyber-4084714 1920.jpg 1.920x1.280; 359 KB
- Cyber-Versicherung-Vereine.png 581x471; 36 KB
- CyberAuge.png 820x312; 43 KB
- Cyberciege.jpg 750x600; 52 KB
- Cybersecurity 5-16 (5734032545).jpg 4.288x1.833; 3,68 MB
- Cybersecurity 5-16 (5734032889).jpg 3.035x2.285; 3,06 MB
- Cybersecurity 5-16 (5734033339).jpg 3.506x2.516; 3,88 MB
- Cybersecurity 5-16 (5734034689).jpg 2.367x2.848; 2,93 MB
- Cybersecurity 5-16 (5734035611).jpg 4.288x2.848; 5,01 MB
- Cybersecurity 5-16 (5734038345).jpg 3.894x2.848; 4,77 MB
- Cybersecurity 5-16 (5734039239).jpg 4.288x2.009; 3,98 MB
- Cybersecurity 5-16 (5734039973).jpg 4.288x2.716; 5,13 MB
- Cybersecurity 5-16 (5734040837).jpg 4.288x2.848; 5,19 MB
- Cybersecurity 5-16 (5734583756).jpg 4.288x2.848; 5,01 MB
- Cybersecurity 5-16 (5734584178).jpg 2.331x2.848; 2,96 MB
- Cybersecurity 5-16 (5734586220).jpg 2.120x2.848; 2,53 MB
- Cybersecurity 5-16 (5734586514).jpg 4.288x2.028; 4,11 MB
- Cybersecurity 5-16 (5734587238).jpg 4.288x2.848; 4,97 MB
- Cybersecurity 5-16 (5734588596).jpg 1.804x2.344; 2,06 MB
- Cybersecurity 5-16 (5734591378).jpg 4.288x2.530; 5,17 MB
- Cybersecurity and Infrastructure Security Agency.jpg 1.157x803; 96 KB
- Cybersecurity and the nation's digital future.jpg 3.500x2.333; 779 KB
- Cybersecurity Strategy 5 Layer CS5L.png 585x601; 65 KB
- Cybersecurity Strategy 5 layer CS5L.png 585x600; 66 KB
- Cybersecurity Strategy CS5L Capability Maturity Model CMM.jpg 1.072x955; 111 KB
- Cybersecurity Visuals Challenge 2019 - Afsal cmk.jpg 770x578; 23 KB
- Cybersecurity Visuals Challenge 2019 - John Hurley.png 887x514; 34 KB
- Cybersecurity Visuals Challenge 2019 - Rebecca Wang.jpg 770x555; 31 KB
- Cybersecurity.png 8.000x4.500; 1,61 MB
- Cyberstorm.mu team picture.jpg 1.600x960; 283 KB
- Cycle PCA.svg 319x213; 6 KB
- Cyfirma Intro.jpg 1.406x797; 186 KB
- CYFIRMA's Cyber Security Controls Overview.png 800x678; 198 KB
- Damo package.jpg 3.648x2.736; 1,68 MB
- Damo penta.jpg 2.448x3.264; 1,99 MB
- Danielle Fieseler works on a cybersecurity risk posture project.jpg 4.928x3.264; 1 MB
- Data Flow Diagram - Online Banking Application.jpg 728x546; 80 KB
- DC Spy Museum - Aurora Vulnerability Exhibit.jpg 3.024x4.032; 1,93 MB
- Decocidio.png 150x77; 4 KB
- DEF CON 14 - Strom Carlson - Hacking FedEx Kinko's - How Not To Implement Stored-Value Card Systems.webm 47 min 16 s, 720 × 480; 109,13 MB
- Deniss calovskis - digitala era 2018.jpg 640x819; 150 KB
- Desktop in c drive.jpg 1.366x768; 74 KB
- Development Center of TEC Solutions Limited.jpg 450x306; 230 KB
- Diagramme ArchiEmulateur.png 1.254x987; 168 KB
- Diagramme ArchiHyperviseur.png 1.254x858; 164 KB
- Diagramme ArchiIsolateur.png 1.250x849; 133 KB
- Diagramme ArchiKernelUserSpace.png 1.250x779; 105 KB
- Differential power analysis translate fr.png 713x563; 88 KB
- Differential power analysis.svg 713x563; 264 KB
- Disabling 2FA on Wikipedia.webm 16 s, 1.488 × 820; 2,1 MB
- DiskCryptor-logo-32x32.png 32x32; 2 KB
- Distance bounding protocol of Brands and Chaum.png 960x720; 10 KB
- Dsin small.jpg 200x130; 10 KB
- Durga Prasad Dube.jpg 2.592x3.872; 3,48 MB
- EBIOS-Modules.jpg 246x287; 38 KB
- EFSOperation ja.jpg 1.203x1.599; 169 KB
- EFSOperation.svg 1.200x1.600; 255 KB
- EMCO Software logo.png 228x96; 20 KB
- Enclave.JPG 480x377; 31 KB
- Endpoint.JPG 598x326; 41 KB
- Engagement-dojo.png 2.656x1.372; 316 KB
- EvilTwinWireless.jpg 550x389; 29 KB
- F-Secure-logo-250x70.png 1.401x401; 26 KB
- Fork bomb.svg 1.300x800; 122 KB
- Function Hooking.svg 450x550; 22 KB
- Gameofhacking.jpg 3.024x4.032; 2 MB
- GAO-19-332 Critical Infrastructure Protection - Actions Needed to Address Significant Cybersecurity Risks Facing the Electric Grid.pdf 1.275 × 1.650, 84 de pagini; 4,81 MB
- Garg Brothers inside view.jpg 4.040x2.246; 1,68 MB
- GCS2017 Logo vertical color.jpg 3.720x3.749; 1.019 KB
- GerixWifiCracker.png 660x674; 93 KB
- Graham Cluley.jpg 2.320x3.088; 4,89 MB
- Graphiquemalware.jpeg 550x315; 24 KB
- GraphUpdateSignature.png 637x759; 58 KB
- Handshake TLS.png 861x868; 57 KB
- HAR2009 Canonical logo.png 595x419; 976 KB
- Harj.png 1.200x1.200; 158 KB
- Hash function el.svg 520x352; 88 KB
- Hashlink timestamping.svg 1.265x550; 73 KB
- Helith Logo.png 288x78; 4 KB
- Heras af medium.png 433x207; 15 KB
- Hid logo.gif 113x45; 688 octeți
- HijackThis-logo.png 128x128; 13 KB
- Hijaking.jpg 365x264; 9 KB
- HistoriqueVirtual.png 695x130; 12 KB
- Homemade BeigeBox.jpg 1.536x2.048; 821 KB
- Horangi-Logo.png 1.250x1.250; 35 KB
- Host Proof Storage.jpg 184x163; 12 KB
- Hybride-token.png 1.069x433; 149 KB
- Hyperviseur multiple.png 516x121; 7 KB
- Hyperviseur type 1 et 2.png 481x274; 10 KB
- Identity fabric - connecting anyone to every service.png 3.354x1.390; 255 KB
- Identity-concept.svg 1.383x912; 32 KB
- Idlescan 2.png 428x423; 37 KB
- Idlescan.png 784x273; 63 KB
- Ids hybride.png 1.018x699; 18 KB
- Information Flow Policy Confidentiality Lattice.png 415x402; 25 KB
- Innercoverhksarepassport.JPG 4.000x3.000; 2,03 MB
- Innercoverhksarpassport2ndversion.jpg 4.000x3.000; 2,18 MB
- Inside Penta.jpg 3.461x2.334; 3,98 MB
- InstaSafe Logo.png 350x350; 91 KB
- Intellectual Property, Espionage, and Cryptography Triangle c.gif 1.261x1.142; 51 KB
- Intelligent access control door wiring.PNG 514x504; 39 KB
- IPFire Logo.png 261x340; 112 KB
- Iptablesfb.png 1.280x1.024; 59 KB
- ISA-62443 Standard Series 2012.png 2.929x2.104; 245 KB
- Isms framework.jpg 600x411; 67 KB
- ISO27001 Asset Management.JPG 680x425; 24 KB
- J-VIS gate J.svg 549x363; 32 KB
- JAP screenshot.png 493x467; 60 KB
- Java Update virus.png 1.366x768; 56 KB
- Jfk data protection world forum hj 2.jpg 902x902; 42 KB
- Josh Schiavone Developing ThreadBoat.jpg 1.492x2.500; 597 KB
- Karoshi logo.png 89x72; 13 KB
- KD SQLIA Classification 2010.png 1.202x1.650; 280 KB
- Kdesu proper.png 397x258; 11 KB
- Kdesudo.png 410x236; 25 KB
- Kerkesa e regjistrit.jpg 620x233; 27 KB
- Keylogger client demonstration.png 1.925x1.002; 54 KB
- Korugan Logo.png 170x37; 4 KB
- Kvalita hesla.jpg 620x192; 56 KB
- Küberolümpia 2017 esikolmik.jpg 4.375x2.917; 6,97 MB
- Küberolümpia 2017 osalejad.jpg 5.184x3.456; 7,35 MB
- Küberolümpia 2017 võitjad.jpg 4.948x3.299; 7,96 MB
- Lamoascii.png 286x414; 11 KB
- LearningSignatureMalware.png 875x1.075; 163 KB