Categories
From GCA ACT
Jump to navigationJump to search
The following categories exist on the wiki, and may or may not be unused. Also see wanted categories.
- Vermont (4 members)
- Videos (17 members)
- Vietnam (3 members)
- Virginia (17 members)
- Virtual Assistants & Smart Speakers (4 members)
- Voice AI (1 member)
- Voice Analysis (2 members)
- Volunteer Authentication (1 member)
- Volunteer Information (1 member)
- Volunteer Relationships (1 member)
- Voters (27 members)
- Voters-1 (1 member)
- Voting Systems (0 members)
- Vulnerability Alerts (1 member)
- Vulnerability Assessment (1 member)
- Vulnerability Information (1 member)
- Vulnerability Management (5 members)
- Vulnerability Research (2 members)
- Wallet Mnemonic Seed Phrase Protection (Storage, Retrieval, and Use) (2 members)
- Wallet Mnemonic Seed Phrase Protection (Storage - Retrieval - Use) (1 member)
- Wallet Private Key Protection (Storage, Retrieval, and Use) (4 members)
- Wallet Private Key Protection (Storage - Retrieval - Use) (1 member)
- Wallet Transaction Approval Risk Management (5 members)
- Washington (5 members)
- Watch-Only Wallet (3 members)
- Weather apps (4 members)
- Web Developers (5 members)
- Website (30 members)
- Website and application security services (1 member)
- Websites & Applications (51 members)
- West Virginia (3 members)
- What are Cryptocurrency Exchanges? (3 members)
- What are Digital Currency Wallets? (1 member)
- What are Digital Wallets? (1 member)
- What is Digital Currency? (1 member)
- What is a Private Key? (1 member)
- What is a Rug-Pull? (3 members)
- WiFi & Wireless Access Points (WAPs) (7 members)
- Windows (11 members)
- Wisconsin (10 members)
- Wyoming (2 members)
- YARA (7 members)
- Yemen (2 members)
- You and Your Child's Data (5 members)
- Young Adults (18 - 25 yo) (4 members)
- Zero Trust (24 members)
- CIS Controls - v8.0 (1 member)
- Intrusion Detection & Prevention Systems (IDPS) (1 member)
- NIST CSF v1.1 (1 member)
- Parent (1 member)