Security: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized ...)
 
mNo edit summary
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not.  [[Information assurance]] is the broadest technical subcategory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and things from physical damage or compromise.
{{PropDel}}<br><br>{{subpages}}
In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not.  [[Information assurance]] is the broadest technical subcategory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and things from physical damage or compromise.[[Category:Suggestion Bot Tag]]

Latest revision as of 16:00, 16 October 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

In the broadest sense, security involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. Information assurance is the broadest technical subcategory, although there are aspects of law and policy beyond it. Physical security is another subcategory, involving the protection of persons, places, and things from physical damage or compromise.