Network reconnaissance/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Housekeeping Bot m (Automated edit: Adding CZ:Workgroups to Category:Bot-created Related Articles subpages) |
imported>Howard C. Berkowitz No edit summary |
||
Line 2: | Line 2: | ||
==Parent topics== | ==Parent topics== | ||
{{r|Information security}} | |||
{{r|Network security}} | |||
==Subtopics== | ==Subtopics== | ||
{{r|Address sweep}} | |||
{{r|Port scanning}} | |||
==Other related topics== | ==Other related topics== | ||
{{r|Botnet}} | {{r|Botnet}} | ||
{{r|Telnet}} | {{r|Telnet}} | ||
{{r|Ping}} | |||
{{ | |||
Revision as of 01:40, 4 March 2010
- See also changes related to Network reconnaissance, or pages that link to Network reconnaissance or to this page or whose text contains "Network reconnaissance".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Network security [r]: Add brief definition or description
Subtopics
- Address sweep [r]: Add brief definition or description
- Port scanning [r]: A class of network reconnaissance techniques that may be part of legitimate network operations, or a probing to find vulnerabilities to attack [e]
- Botnet [r]: A set of compromised computers which can collectively provide services to a "bot herder". [e]
- Telnet [r]: The basic Internet character-by-character communications applications protocol, which runs over the Transmission Control Protocol (TCP) [e]
- Ping [r]: Add brief definition or description