Wikia

The IT Law Wiki

Recent changes

Special page

Recent changes options Show last 50 | 100 | 250 | 500 changes in last 1 | 3 | 7 | 14 | 30 days
Hide minor edits | Show bots | Hide anons | Hide users | Hide my edits | Hide grouped recent changes | Hide logs
Show new changes starting from 12:16, September 5, 2015
   

September 5, 2015

 N    05:00 Web defacement‎ (diff | hist) . . (+31)‎ . . Mdscott (Talk | contribs) (Redirected page to Website defacement)
  m   04:58 Hacktivist‎ (diff | hist) . . (+382)‎ . . Mdscott (Talk | contribs) (Overview: )
  m   04:54 Cybercrime‎ (diff | hist) . . (+875)‎ . . Mdscott (Talk | contribs) (Overview: )
 N    04:44 Network defence‎ (diff | hist) . . (+28)‎ . . Mdscott (Talk | contribs) (Redirected page to Network defense)
  m   04:43 Cyber adversary‎ (diff | hist) . . (+307)‎ . . Mdscott (Talk | contribs)
+-     04:39 Website defacement‎‎ (2 changes | hist) . . (+70)‎ . . [Mdscott‎ (2×)]
 m   04:39 (cur | prev) . . (-2)‎ . . Mdscott (Talk | contribs)
 m   04:39 (cur | prev) . . (+72)‎ . . Mdscott (Talk | contribs)
+-N    04:36 Watering-hole technique‎‎ (2 changes | hist) . . (+462)‎ . . [Mdscott‎ (2×)]
     04:36 (cur | prev) . . (+69)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    04:36 (cur) . . (+393)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == A '''watering-hole technique''' is the {{Quote|[c]ompromise and placement of malware by cyber adversaries on a legitimate website...")
  m   04:14 Watering hole‎ (diff | hist) . . (+30)‎ . . Mdscott (Talk | contribs) (See also: )
  m   04:14 Watering hole attack‎ (diff | hist) . . (+30)‎ . . Mdscott (Talk | contribs)
  m   04:12 Tradecraft‎ (diff | hist) . . (+296)‎ . . Mdscott (Talk | contribs)
+-N    04:09 Systems of national interest‎‎ (2 changes | hist) . . (+507)‎ . . [Mdscott‎ (2×)]
     04:09 (cur | prev) . . (+48)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    04:09 (cur) . . (+459)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''Systems of national interest''' are {{Quote|[s]ystems that, if rendered unavailable or otherwise compromised, could result in significant...")
+-N    04:05 State-sponsored‎‎ (4 changes | hist) . . (+269)‎ . . [Mdscott‎ (4×)]
     04:05 (cur | prev) . . (+51)‎ . . Mdscott (Talk | contribs) (Adding categories)
 m   04:05 (cur | prev) . . (+1)‎ . . Mdscott (Talk | contribs)
 m   04:04 (cur | prev) . . (-2)‎ . . Mdscott (Talk | contribs)
N    04:04 (cur) . . (+219)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''State-sponsored''' refers to "[a]n activity initiated and/or conducted by or for a foreign government body.<ref>ACSC 2015 Threat Report, Glossary, at ...")
+-N    04:00 Sophisticated capability‎‎ (2 changes | hist) . . (+548)‎ . . [Mdscott‎ (2×)]
     04:00 (cur | prev) . . (+91)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    04:00 (cur) . . (+457)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''Sophisticated capability''' refers to {{Quote|[a]n adversary with a full range of access, expertise and operational reach. Sophisticated state-sp...")

September 4, 2015

  m   15:34 Removable media‎ (diff | hist) . . (+155)‎ . . Mdscott (Talk | contribs)
+-N    15:25 Issue-motivated group‎‎ (3 changes | hist) . . (+309)‎ . . [Mdscott‎ (3×)]
     15:25 (cur | prev) . . (+50)‎ . . Mdscott (Talk | contribs) (Adding categories)
 m   15:25 (cur | prev) . . (-2)‎ . . Mdscott (Talk | contribs)
N    15:25 (cur) . . (+261)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == An '''issue-motivated group''' is "[a] coalition of communities or individuals, often loosely formed, that is primarily drawn around a common interest."<ref>...")
  m   15:22 Hacktivism‎ (diff | hist) . . (+309)‎ . . Mdscott (Talk | contribs) (Definition: )
+-     15:13 Digital device‎‎ (3 changes | hist) . . (+28)‎ . . [151.229.239.24‎; Mdscott‎ (2×)]
 m   15:13 (cur | prev) . . (+28)‎ . . Mdscott (Talk | contribs)
 m   14:59 (cur | prev) . . (-24)‎ . . Mdscott (Talk | contribs) (Undo revision 181637 by 151.229.239.24 (talk))
     05:25 (cur | prev) . . (+24)‎ . . 151.229.239.24 (Talk) (Definition: )
      14:59 (Block log) . . Mdscott (Talk | contribs) blocked 151.229.239.24 (Talk) with an expiry time of 1 year (anonymous users only, account creation disabled, cannot edit own talk page) ‎(Inserting nonsense/gibberish into pages)
+-N    14:54 Form-grabbing‎‎ (2 changes | hist) . . (+687)‎ . . [Mdscott‎ (2×)]
     14:54 (cur | prev) . . (+66)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    14:54 (cur) . . (+621)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''Form-grabbing''' is {{Quote|[a] more advanced type of keylogging where the data is captured from browser forms, before data is sent o...")
 N    04:57 Computerised‎ (diff | hist) . . (+25)‎ . . Mdscott (Talk | contribs) (Redirected page to Computerized)
+-     04:56 Exploit‎‎ (2 changes | hist) . . (+109)‎ . . [Mdscott‎ (2×)]
 m   04:56 (cur | prev) . . (+56)‎ . . Mdscott (Talk | contribs) (Definitions: )
 m   04:55 (cur | prev) . . (+53)‎ . . Mdscott (Talk | contribs) (Definitions: )
+-     04:52 Drive-by download‎‎ (3 changes | hist) . . (+412)‎ . . [Mdscott‎ (3×)]
 m   04:52 (cur | prev) . . (-6)‎ . . Mdscott (Talk | contribs) (Definition: )
 m   04:51 (cur | prev) . . (0)‎ . . Mdscott (Talk | contribs)
 m   04:50 (cur | prev) . . (+418)‎ . . Mdscott (Talk | contribs)
+-     04:44 Cyber espionage‎‎ (2 changes | hist) . . (+212)‎ . . [Mdscott‎ (2×)]
 m   04:44 (cur | prev) . . (-14)‎ . . Mdscott (Talk | contribs) (Definitions: )
 m   04:43 (cur | prev) . . (+226)‎ . . Mdscott (Talk | contribs) (Definitions: )
+-N    04:40 Technology-enabled crime‎‎ (2 changes | hist) . . (+428)‎ . . [Mdscott‎ (2×)]
     04:40 (cur | prev) . . (+76)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    04:40 (cur) . . (+352)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == A '''technology-enabled crime''' is a {{Quote|[c]rime[] where computers or ICT are an integral part of an offence, such as online fraud, [[onlin...")
+-N    04:08 Pure cybercrime‎‎ (3 changes | hist) . . (+367)‎ . . [Mdscott‎ (3×)]
     04:08 (cur | prev) . . (+48)‎ . . Mdscott (Talk | contribs) (Adding categories)
 m   04:08 (cur | prev) . . (0)‎ . . Mdscott (Talk | contribs)
N    04:08 (cur) . . (+319)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == A '''Pure cybercrime''' is a {{Quote|[c]rime[] directed at computing or other ICT such as unauthorised access to, modification of or [[impai...")
      02:07 (User creation log) . . Kflee2000 (Talk | contribs) created a user account ‎

September 3, 2015

+-     18:59 Cybercrime‎‎ (2 changes | hist) . . (-71)‎ . . [Mdscott‎ (2×)]
 m   18:59 (cur | prev) . . (-124)‎ . . Mdscott (Talk | contribs)
 m   18:58 (cur | prev) . . (+53)‎ . . Mdscott (Talk | contribs) (See also: )
  m   18:57 Cyber security incident‎ (diff | hist) . . (+285)‎ . . Mdscott (Talk | contribs)
+-     17:54 Cyber intrusion‎‎ (2 changes | hist) . . (+318)‎ . . [Mdscott‎ (2×)]
 m   17:54 (cur | prev) . . (0)‎ . . Mdscott (Talk | contribs) (Definition: )
 m   17:54 (cur | prev) . . (+318)‎ . . Mdscott (Talk | contribs)

Around Wikia's network

Random Wiki