This article is part of a series on Information security.

Related security categories:

Threats:

Defenses:

(Computer security navbar)