Wiki99/computer security

From Meta, a Wikimedia project coordination wiki

This is the Wiki99 list for topics about computer security.

About[edit]

Wiki99 is the idea to have a list of about 99 Wikipedia articles which should be translated into as many languages as possible in order to establish common understanding in a field.

If the Wikipedia articles have at least been started, then access them in available languages by clicking through.

Translations start with structured data translation in Wikidata, then proceed to translation of prose in Wikipedia.

Wiki99 list by topic[edit]

General[edit]

Image
Wikipedia articles
Description on Wikidataensim
ple
afamanarasastavayazbabebgbmbnbobrbscacechckbcocscvcydadedvdzeeeleoeseteuextfafffifjfofrfygagdglgngswgugvhahakhehihrhthuhyiaidieigioisitiujajvkakgkkklkmknkokskukwkylalblglilnloltlvmgmkmlmnmrmsmtmynannbnenlnnnyocomorospapiplpnbpsptqurmrnrorurwsascsdseshsiskslsnsosqsrstsusvswtatetgthtitktltrtstttwugukuruzvivowawarwowuuxhyiyoyuezazhzuΣ
Wikidata item
st.
c:
1information technologydevelopment, management, and use of computer-based information systems98Q11661142
2cryptographypractice and study of secure communication techniques84Q8789151
3encryptionprocess of encoding information, which is conversion of the original representation of the information, known as plaintext, into an alternative form known as ciphertext68Q141090121
4hackerperson who uses technical knowledge to achieve a goal within a computerized system by non-standard means66Q148781
5computer securitythe protection of computer systems and networks from theft, damage, misuse or data leak64Q3510521111
6proxy serverComputer server that makes and receives requests on behalf of a user54Q1118931
7information securityprotecting information by mitigating information risks49Q18990091
8authenticationact of confirming the truth of an attribute of a datum or entity, often used as part of access control50Q2121089
9deep webcontent of the World Wide Web that is not indexed by search engines47Q22198981
10software testinginvestigation conducted to provide information about the quality of a software product or service under test and enable the business to understand the risks of software implementation47Q1885228
11proprietary softwarecomputer software released under a license restricting use, study or redistribution49Q2186166
12vulnerabilitysecurity weakness which allows an attacker to reduce a system's information assurance31Q63142591
13doxingInternet-based practice of researching and broadcasting private or identifying information about an individual or organization33Q1590141131
14multi-factor authenticationauthentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism35Q787866251
15green computingstudy and practice of environmentally sustainable computing or IT25Q106474631
16dependency hellfrustration of some software users who have installed software packages which have dependencies on specific versions of other software packages11Q323411341
17password policyset of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly8Q339468731
18programming ethics2Q183448161
19software securitysecurity aspects of softwareQ1148600222
20crisis communicationsub-specialty of the public relations profession that is designed to protect and defend an individual, company, or organization facing a public challenge to its reputation16Q3788742
21security.txtfile format for posting security contact information11Q6505715521
22memory safetyState of being protected from memory access bugs10Q40809833
23post-quantum cryptographycryptography that is secure against quantum computers16Q72335764
Σautolist gallery22147116161322111271481711121887191512191418581211510101281134613163681418621111412711731262142153336132518214192561091712116692511413112098102171311195874avg.:  5 \ 38
(23 %)
14416

Technical concepts and technologies[edit]

Image
Wikipedia articles
Description on Wikidataensim
ple
afamanarasastavayazbabebgbmbnbobrbscacechckbcocscvcydadedvdzeeeleoeseteuextfafffifjfofrfygagdglgngswgugvhahakhehihrhthuhyiaidieigioisitiujajvkakgkkklkmknkokskukwkylalblglilnloltlvmgmkmlmnmrmsmtmynannbnenlnnnyocomorospapiplpnbpsptqurmrnrorurwsascsdseshsiskslsnsosqsrstsusvswtatetgthtitktltrtstttwugukuruzvivowawarwowuuxhyiyoyuezazhzuΣ
Wikidata item
st.
c:
1bitcoin (2009–)digital cash system and associated currency102Q131723392
2blockchaindistributed data store for digital transactions79Q20514253131
3HTTP cookiesmall piece of data sent from a website and stored on the user's computer by the user's web browser58Q17899571
4HTTPS (1994–)extension of the HTTP communications protocol to support TLS encryption56Q4448491
5Secure Shell (1995–)cryptographic network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers54Q170460101
6Data Encryption Standard (1975–)Early unclassified symmetric-key block cipher49Q13503591
7Advanced Encryption Standardblock cipher standard47Q19074681
8Transport Layer Securitycryptographic protocols for securing data in transit47Q20649413
9MD5 (1991–)message-digest hashing algorithm46Q1852357
10non-fungible tokenspecial type of cryptographic token which represents something unique50Q5564845291
11dark web (2009–)part of the World Wide Web that is not directly reachable from the public Internet47Q41200827
12Border Gateway Protocolprotocol for communicating routing information on the Internet38Q111552
13digital certificateelectronic document used to prove the ownership of a public key37Q27475831
14Diffie–Hellman key exchangemethod of exchanging cryptographic keys30Q62344761
15SHA-2 (2002–)set of cryptographic hash functions designed by the NSA25Q19686056
16SHA-1 (1995–)cryptographic hash function25Q134149527
17Web3 (2014–)concept for a decentralized Internet29Q1066779333
18SHA-3 (2008–)set of cryptographic hash functions19Q11909479
19Common Vulnerabilities and Exposuresa list of publicly known cybersecurity vulnerabilities16Q9495099510
20HTTP Strict Transport SecurityHTTP response header field and associated policy15Q24385401
21virtual private network serviceprovider offering access to virtual private network services1Q562404021
22password managersubclass of utility software20Q12811996
Σautolist gallery timeline221581182112251583197181313201282012121917112123811981011511712317204521912211914510731013313117511332013201142021829812141143424111318242135151132411212890avg.:  5 \ 40
(25 %)
18511

Attacks[edit]

Image
Wikipedia articles
Description on Wikidataensim
ple
afamanarasastavayazbabebgbmbnbobrbscacechckbcocscvcydadedvdzeeeleoeseteuextfafffifjfofrfygagdglgngswgugvhahakhehihrhthuhyiaidieigioisitiujajvkakgkkklkmknkokskukwkylalblglilnloltlvmgmkmlmnmrmsmtmynannbnenlnnnyocomorospapiplpnbpsptqurmrnrorurwsascsdseshsiskslsnsosqsrstsusvswtatetgthtitktltrtstttwugukuruzvivowawarwowuuxhyiyoyuezazhzuΣ
Wikidata item
st.
c:
1malwaresoftware that is intentionally hostile, intrusive, or damaging to a computer or network72Q1400191
2phishingattempt to trick a person into revealing information75Q13500572
3denial-of-service attackcyber attack disrupting service by overloading the provider of the service56Q1314063
4ransomwareProgram that locks files until a sum of money is paid58Q92633181
5WannaCry ransomware attack (2017–)ransomware cyberattack50Q2995704192
6botnetcollection of compromised internet-connected devices controlled by a third party47Q3176716
7SQL injectiontype of code injection, used to attack vulnerable data-driven software applications41Q5060594
8StuxnetMalicious computer worm36Q5347962
9ILOVEYOU (2000–)computer worm37Q8560969
10deepfakeartificial intelligence-based human image synthesis technique44Q4947317972
11brute-force attackcryptanalytic method for unauthorized users to access data via an exhaustive search34Q8693705
12man-in-the-middle attackform of active eavesdropping in which the attacker makes connections with the victims and relays messages between them33Q5548303
13Pegasusspyware software34Q2673473710
14cyberattackany attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of a computer system34Q40719287
15exploitsoftware, data or commands that use a bug or vulnerability to compromise a computer system31Q112874
16zero-daycyberattack that utilizes a recently-publicized computer software vulnerability on systems which are yet to be mitigated27Q8467263
17cross-site request forgery (2001–)type of malicious exploit of a website where unauthorized commands are transmitted from a user trusted by the web app, using image tags, hidden forms, XMLHttpRequest etc.21Q154014726
18zip bombmalicious archive file designed to crash or render useless the program or system reading it21Q6357582
19AACS encryption key controversyattempts by MPAA and AACS-LA to prevent the distribution of a cryptographic key5Q2272961
20supply chain attackcyber-attack that seeks to damage an organization by targeting less-secure elements in the supply network5Q76445241
21cryptojackinghijacking a target's processing power in order to mine cryptocurrency on the hacker's behalf11Q1071212192
22backdoorcovert method of bypassing authentication or encryption in a computer39Q2545692
Σautolist gallery timeline22145203174891517620191711322131219172014411985113133172217192611202397414629831111721620219110195111079131715101317188615138211811avg.:  5 \ 37
(23 %)
11911

State level challenges[edit]

Image
Wikipedia articles
Description on Wikidataensim
ple
afamanarasastavayazbabebgbmbnbobrbscacechckbcocscvcydadedvdzeeeleoeseteuextfafffifjfofrfygagdglgngswgugvhahakhehihrhthuhyiaidieigioisitiujajvkakgkkklkmknkokskukwkylalblglilnloltlvmgmkmlmnmrmsmtmynannbnenlnnnyocomorospapiplpnbpsptqurmrnrorurwsascsdseshsiskslsnsosqsrstsusvswtatetgthtitktltrtstttwugukuruzvivowawarwowuuxhyiyoyuezazhzuΣ
Wikidata item
st.
c:
1cyberwarfareuse of technological force within cyberspace52Q84934051
2electronic warfarecombat involving electronics and directed energy47Q27282651
3information warfareform of indirect warfare41Q9110365
4cyberterrorismuse attacks based on Internet or other computing and telecommunication networks in terrorist activities30Q11370044
5XKeyscoreamerican NSA Internet data scanner20Q141501393
6Vault 7series of documents released by WikiLeaks in 201718Q289129816
7privacy policystatement or a legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer's or client's data21Q19998314
8Common Vulnerabilities and Exposuresa list of publicly known cybersecurity vulnerabilities16Q9495099510
9nuclear electromagnetic pulseburst of electromagnetic radiation created by a nuclear explosion13Q159826683
10government by algorithmGoverment by algorithm11Q963797881
11artificial intelligence arms racearms race for the most advanced technologies in terms of artificial intelligence8Q487320831
12Artificial intelligence in governmentgovernmental use of AI7Q607676981
13CyberocracyFuturistic form of governance7Q5197824
14software copyrightconcept of copyright applied to computer code4Q11315264
15cyber-security regulationgovernment mandated computer security2Q5197670
Σautolist gallery1521225231736392112527810117534816919112132311417217210392114283237923539297avg.:  2 \ 20
(12 %)
482

FLOSS software, open standards, free culture, open-source security[edit]

Image
Wikipedia articles
Description on Wikidataenaaababsaceadyaebafakalnaltamamiananganpararnarqaryarzasaseastatjavavkawaayazazbbabanbarbbcbccbcibclbebe-
tar
ask
bgbgnbhobibjnblkbmbnbobpybqibrbrhbrxbsbtmbtobugbxrcacbk-x-zamcdocecebchchochrchyckbcocpscrcrhcscsbcucvcydadagdedindiqdsbdtpdtydvdzeeegleleoeseteuextfafatfffifitfjfofonfrfrcfrpfrrfurfygagaagaggangcfgcrgdgilglgldglkgnFile:Goa government banner.pnggomgorgotgpegrcgswgugucgurguwgvhahakhawhehihifhilhohrhrxhsbhsnhthuhyhywhziaidieigiiikiloinhioisitiujajamjbojutjvjv-x-bmskakaakabkbdkbpkcgkeakgkhwkikiukjkjpkkklkmknkokoikrkrckrikrjkrlkskshkswkukumkvkwkylaladlblbelezlfnlglilijlivlkilldlmolnlolozlrcltltglusluzlvlzhlzzmadmaimdfmgmhmhrmiminmkmlmnmnimnwmosmrmrhmrjmsmtmusmwlmymyvmznnanahnannapFile:Taranto City Flag.jpgnap
-x-
tar
a
nbndndsnds-nlnenewngnianiunlnmznnnodnovnqonrfnsonvnynynnysocojboloomorospapagpampappcdpcmpdcpdtpflpipihplpmspnbpntprgpsptpwnququgrcfrgnrifrmrmcrmyrnrorskruruerupruqrwryusasahsatscscnscosdsdcsdhseseisessgsgsshshishnshysisim
ple
sjdsjeskskrslslismsmasmnsmssnsosqsrsrnsrossststqstysusvswsycszlszytataotaytcytddtetettgthtitktltlytntotpitrtrutrvtstttumtwtytyvtzmudmugukuruzvaivevecvepvivlsvmfvmwvovotvrowawalwarwlswowuuxacxalxhxmfxsyyiyoyoiyrkyrlyuayuezazeazghzhzuΣ
Wikidata item
st.
c:
1GNU General Public Licenseseries of free software licenses76Q7603163
2BitTorrent (2001–)peer-to-peer file sharing protocol66Q13386252
3Git (2005–)distributed version control system64Q186055342
4Tordaemon and utilities to allow traffic to reach the Tor network64Q202044262
5Pretty Good Privacycomputer program for data encryption, primarily in email (PGP)46Q122745215
6Signal (2014–)privacy-focused encrypted messaging app45Q19718090322
7Visual Studio Code (2015–)source code editor developed by Microsoft42Q19841877232
8OpenVPN (2002–)open-source software application30Q509075231
9OAuthopen standard for authorization29Q74323882
10InterPlanetary File Systemcontent-addressable, peer-to-peer hypermedia distribution protocol23Q21422344141
11Log4Shell2021 software security vulnerability16Q11006843310
12Common Vulnerability Scoring Systemstandard for assessing computer system vulnerabilities9Q102458221
13open-source software securitycomputer security applied to open source software3Q70964212
14algorithmic transparencystudy on the transparency of algorithms3Q556036243
15diversity in open source softwarediversity in an interest group2Q303255702
Σautolist gallery timeline1522112625161104102103912771251011913241111043841821111124131111511561362253271033210112571211112117546692521611021253814411518avg.:  1 \ 35
(8 %)
21518

See also[edit]