Information security/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Electronic warfare}} {{r|Signals intelligence}} {{r|Risk assessment}} {{r|Privacy}} {{r|Auditing}} ==Subtopics== {{r|Access control}} {{r|Authenticati...) |
imported>Meg Taylor No edit summary |
||
Line 24: | Line 24: | ||
{{r|Bank Secrecy Act}} | {{r|Bank Secrecy Act}} | ||
{{r|Health Insurance Portability and Accountability Act}} | {{r|Health Insurance Portability and Accountability Act}} | ||
{{r| | {{r|Patriot Act}} | ||
{{r|Radio}} | {{r|Radio}} | ||
{{r|Radar}} | {{r|Radar}} |
Revision as of 20:24, 30 November 2013
- See also changes related to Information security, or pages that link to Information security or to this page or whose text contains "Information security".
Parent topics
- Electronic warfare [r]: A subset of information operations that deals with the use of electromagnetic or kinetic means to degrade an enemy's military electronics systems, to be able to operate one's own electronics in the face of enemy attacks, and to evade those attacks through protection or deception [e]
- Signals intelligence [r]: Add brief definition or description
- Risk assessment [r]: Add brief definition or description
- Privacy [r]: Add brief definition or description
- Auditing [r]: Add brief definition or description
Subtopics
- Access control [r]: Add brief definition or description
- Authentication [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Compartmented control system [r]: Add brief definition or description
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Digital certificate [r]: A means by which the user of a public key can obtain it from a central repository, with high confidence that key is correct and has not been revoked [e]
- Direction finding [r]: Add brief definition or description
- Low probability of intercept [r]: Add brief definition or description
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
- Miscreant [r]: One who enters a computer or computer network without authorization by the owner or administrator, regardless of the motivation for entry [e]
- Official Secrets Act [r]: Add brief definition or description
- Traffic analysis [r]: Add brief definition or description
- Bank Secrecy Act [r]: A piece of legislation with a somewhat confusing name, as it is intended to strip secrecy from certain bank customers who engage in possibly illegal activities, suggestive of money laundering or tax evasion [e]
- Health Insurance Portability and Accountability Act [r]: a 1996 U.S. statute protecting the confidentiality of medical records [e]
- Patriot Act [r]: Add brief definition or description
- Radio [r]: Add brief definition or description
- Radar [r]: Add brief definition or description
- Sarbanes-Oxley Act [r]: Add brief definition or description
- Social engineering [r]: Add brief definition or description
- Transborder data flow [r]: Add brief definition or description