Security: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized ...) |
mNo edit summary |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. [[Information assurance]] is the broadest technical subcategory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and things from physical damage or compromise. | {{PropDel}}<br><br>{{subpages}} | ||
In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. [[Information assurance]] is the broadest technical subcategory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and things from physical damage or compromise.[[Category:Suggestion Bot Tag]] |
Latest revision as of 16:00, 16 October 2024
This article may be deleted soon. | ||
---|---|---|
In the broadest sense, security involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. Information assurance is the broadest technical subcategory, although there are aspects of law and policy beyond it. Physical security is another subcategory, involving the protection of persons, places, and things from physical damage or compromise. |