Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]
    299 bytes (36 words) - 11:15, 6 May 2010
  • 234 bytes (24 words) - 14:55, 26 February 2010
  • ...firm one's [[identification (information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • {{r|Information security}} {{r|RADIUS (information security)}}
    558 bytes (60 words) - 10:08, 4 May 2022
  • #REDIRECT [[Authentication (information security)#Security token]]
    66 bytes (6 words) - 16:13, 6 May 2010
  • [[Information security]] strategies and technologies that continue to ensure security without depe
    180 bytes (20 words) - 13:01, 16 March 2010
  • Describes the manufacture and sale of information security products which instill in the consumer a false sense of security, because i
    237 bytes (35 words) - 14:55, 25 October 2008
  • {{r|Information security}} {{r|Identification (information security)}}
    368 bytes (39 words) - 05:38, 15 March 2024
  • '''Information assurance''', or sometimes '''information security''', is a broad term that includes both communications security and computer Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules, for the a
    2 KB (232 words) - 16:21, 30 March 2024
  • '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • Department of Information Security for [[Italy|Italian]] intelligence, responsible for security clearances and
    190 bytes (23 words) - 19:49, 4 July 2009
  • {{r|Information security}}
    379 bytes (41 words) - 18:24, 31 January 2009
  • In [[information security]], the assurance that data retrieved from an information system has the sam
    169 bytes (24 words) - 15:24, 30 September 2009
  • {{r|Information security}}
    356 bytes (42 words) - 10:42, 3 September 2008
  • #Redirect [[Information security]]
    34 bytes (3 words) - 20:16, 24 October 2008
  • #REDIRECT [[Information security]]
    34 bytes (3 words) - 23:06, 21 April 2010
  • {{r|Information security||**}}
    558 bytes (70 words) - 14:29, 26 February 2010
  • {{r|Information security}} {{r|RADIUS (information security)}}
    231 bytes (29 words) - 13:28, 1 February 2009
  • '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s. The objective of computer security varies a
    2 KB (267 words) - 05:49, 8 April 2024
  • {{r|Information security}} {{r|Federal Information Security Management Act}}
    342 bytes (47 words) - 14:35, 30 September 2009
  • {{r|Information Security}}
    1 KB (161 words) - 08:37, 4 May 2024
  • #REDIRECT [[Federal Information Security Management Act of 2002]]
    65 bytes (7 words) - 08:55, 13 September 2009
  • #REDIRECT [[Federal Information Security Management Act of 2002]]
    65 bytes (7 words) - 08:55, 13 September 2009
  • #REDIRECT [[Federal Information Security Management Act of 2002]]
    65 bytes (7 words) - 08:52, 13 September 2009
  • #REDIRECT [[Federal Information Security Management Act of 2002/Definition]]
    76 bytes (8 words) - 08:52, 13 September 2009
  • [[Signals intelligence]] and [[information security]] organization of [[Australia]]
    119 bytes (11 words) - 21:20, 22 May 2010
  • {{r|Information security}}
    364 bytes (43 words) - 05:34, 15 March 2024
  • #REDIRECT [[Federal Information Security Management Act of 2002/Related Articles]]
    82 bytes (9 words) - 08:52, 13 September 2009
  • ...ce, such as a serial or [[USB]] port, which serves as an [[authentication (information security)|authenticator]] requiring no human involvement once connected; contains un
    387 bytes (53 words) - 11:23, 7 May 2010
  • [[Australia]]'s organization responsible for [[signals intelligence]] and [[information security]]
    134 bytes (13 words) - 16:17, 22 December 2008
  • {{r|Information security}}
    257 bytes (31 words) - 20:11, 22 February 2009
  • ...tion, in the government of [[New Zealand]], which has responsibility for [[information security]] and [[signals intelligence]]
    174 bytes (20 words) - 16:16, 22 December 2008
  • A block cipher developed by the Korean Information Security Agency, used broadly throughout South Korean industry, but seldom found els
    179 bytes (23 words) - 06:59, 1 October 2009
  • ...the alignment of a system's function and user expectation with respect to information security.
    159 bytes (21 words) - 12:05, 11 July 2010
  • {{r|Information security}}
    220 bytes (27 words) - 02:40, 4 March 2010
  • '''Confidentiality''', with respect to [[information security]], is the assurance that it will not be disclosed to unauthorized individua
    725 bytes (96 words) - 13:27, 30 September 2009
  • ...The Dipartimento delle Informazioni per la Sicurezza (DIS, "Department of Information Security"), is the secretariat for the CISR, but also is the custodian of informati
    1 KB (168 words) - 07:29, 18 March 2024
  • {{r|Information security}}
    322 bytes (42 words) - 20:55, 11 April 2009
  • {{r|Information security}}
    1 KB (173 words) - 14:49, 4 April 2024
  • In [[information security]], the processes of [[identification, authentication and credentialing]] ar
    2 KB (292 words) - 14:55, 20 May 2010
  • {{r|Information security}}
    2 KB (194 words) - 14:48, 4 April 2024
  • In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that may or may not reside in a single physical computer. Large *A substitute for information security administration
    1 KB (190 words) - 05:48, 8 April 2024
  • {{r|Information security}}
    814 bytes (105 words) - 18:35, 11 January 2010
  • {{r|Federal Information Security Management Act of 2002}}
    1 KB (142 words) - 11:26, 6 February 2011
  • '''Integrity''', in [[information security]], refers to the assurance that data retrieved from an information system h
    844 bytes (119 words) - 15:23, 30 September 2009
  • A [[communications intelligence]] and [[information security]] organization in Russia, which became independent of the [[KGB]] at the en
    242 bytes (34 words) - 21:21, 22 May 2010
  • {{r|Information security}}
    428 bytes (56 words) - 08:52, 13 September 2009
  • ...ntral Security Service''', who has authority over the military services' [[information security]] and [[signals intelligence]] units. ...then two principal chiefs, one for signals intelligence and the other for information security.
    2 KB (249 words) - 05:48, 8 April 2024
  • {{rpl|Information security||**}}
    437 bytes (60 words) - 07:12, 5 March 2010
  • {{r|Information security}}
    678 bytes (84 words) - 15:58, 11 January 2010
  • {{r|Information security}}
    1 KB (133 words) - 21:04, 11 January 2010
  • ...m for information security#source authentication|source authentication and information security#integrity|data integrity protection; during a conversation, both players ar
    1 KB (174 words) - 07:34, 18 March 2024
  • ...ed device that generates a device-specific, time-variant [[authentication (information security)|authentication code]], to be validated by an authentication server in comb
    263 bytes (37 words) - 11:15, 7 May 2010
  • ...F)''' is a area with extremely high standards of physical, electronic, and information security, such that it meets the criteria for [[classified information]] subject to
    4 KB (639 words) - 05:49, 8 April 2024
  • 2 KB (319 words) - 21:41, 25 June 2010
  • {{r|Information security}}
    689 bytes (85 words) - 14:31, 22 March 2024
  • {{r|Information security}}
    263 bytes (30 words) - 02:42, 30 November 2008
  • '''Availability''' of an information service, in the context of [[information security]] means that authorized users can depend on being able to use it whenever i
    868 bytes (139 words) - 16:34, 10 June 2010
  • ...fic background for a broad range of activities in signals intelligence and information security.
    848 bytes (113 words) - 16:46, 25 March 2024
  • {{r|Information security}}
    248 bytes (31 words) - 12:03, 28 December 2010
  • {{r|Information security}}
    200 bytes (24 words) - 17:14, 22 February 2009
  • {{r|Information security}}
    1 KB (163 words) - 02:30, 3 February 2010
  • {{r|Information security}}
    211 bytes (24 words) - 15:26, 30 September 2009
  • {{r|Information security}}
    352 bytes (42 words) - 14:59, 20 March 2024
  • {{r|Information security}}
    133 bytes (14 words) - 18:50, 7 February 2009
  • * ''Principles of Information Security, Second Edition'', book by Whitman, M. & Mattord, H., 2005, published by Th
    506 bytes (74 words) - 16:53, 9 December 2008
  • {{r|Information security}}
    455 bytes (56 words) - 10:13, 7 February 2009
  • '''SEED''' is a [[block cipher]] developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea. It is a 16-round [[Feistel cipher
    435 bytes (67 words) - 05:48, 8 April 2024
  • 3 KB (516 words) - 07:30, 18 March 2024
  • 3 KB (451 words) - 18:36, 18 April 2010
  • ...oviding [[information security#integrity|data integrity protection]] and [[information security#source authentication|source authentication]]. The term '''HMAC''' is often
    2 KB (313 words) - 05:49, 8 April 2024
  • {{r|Information security}}
    640 bytes (81 words) - 04:17, 27 April 2010
  • {{r|Information security}}
    578 bytes (75 words) - 02:21, 24 September 2013
  • {{r|Information security}}
    568 bytes (71 words) - 20:51, 11 January 2010
  • {{r|Information security}}
    595 bytes (75 words) - 08:52, 22 April 2024
  • ...egal means such as [[Non-Disclosure Agreement]]s, [[classified information|information security classification]] (e.g., SECRET), and contract stipulation can provide legal
    6 KB (850 words) - 09:34, 7 February 2011
  • {{r|Information security}}
    663 bytes (98 words) - 14:56, 11 July 2010
  • ...l system#special access program|Special Access Program (SAP)]], but not an information security program as is typical for SAPs, the PRP complements the security clearance
    3 KB (426 words) - 03:45, 25 March 2024
  • {{r|Information security}}
    1 KB (133 words) - 09:08, 19 April 2024
  • {{r|Information security}}
    854 bytes (123 words) - 01:07, 2 November 2008
  • '''Digital signatures''' provide [[information security#source authentication|source authentication]] for online documents, message
    2 KB (277 words) - 05:48, 8 April 2024
  • {{r|Information security}}
    1 KB (140 words) - 11:18, 11 January 2010
  • [[Information security]] doctrine demands that while SCADA may be sent by IP, if it involves [[cri
    2 KB (324 words) - 16:37, 22 August 2009
  • 8 KB (1,196 words) - 16:22, 30 March 2024
  • {{r|Information security}}
    1 KB (185 words) - 21:09, 22 September 2010
  • {{r|Federal Information Security Management Act of 2002}}
    1 KB (177 words) - 12:27, 5 April 2024
  • {{r|Information security}}
    2 KB (308 words) - 09:08, 19 April 2024
  • ...cess, and has testified before Congress and executive agencies such as the Information Security Oversight Office. Aftergood is a member of the advisory board of the Elect
    5 KB (765 words) - 07:36, 18 March 2024
  • ...the RSA system which has since grown into one of the major players in the information security industry.
    1 KB (195 words) - 07:35, 18 March 2024
  • ...ww1.va.gov/vapubs/viewPublication.asp?Pub_ID=50&FType=2 VA Directive 6500 (Information Security Program)]
    4 KB (517 words) - 14:34, 2 February 2023
  • ...used to encrypt the message. Thus, the [[public key]] techniques provide [[information security#source authentication|source authentication]] and [[key management]] servic
    3 KB (544 words) - 05:49, 8 April 2024
  • ...nt is better, and GLBA requires that financial institutions have a written information security plan, which not only covers the personal financial data of customers, but f
    6 KB (877 words) - 16:10, 22 June 2010
  • ...(FISMA), was passed to support the [[E-Government Act of 2002]]. Without [[information security]], it is impossible for government to deliver reliable services through ele ##ISO 27000 series information security management standards
    20 KB (2,779 words) - 13:29, 20 March 2023
  • *[[Public key]] techniques are often used for [[information security#source authentication|source authentication]], to authenticate people or de ...e often authenticated with a [[hashed message authentication code]], for [[information security#integrity|data integrity protection]]. This prevents [[rewrite attack]]s, a
    6 KB (903 words) - 05:49, 8 April 2024
  • * [[SEED (cipher)|SEED]], developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea.
    4 KB (551 words) - 12:36, 13 April 2016
  • [[Information security#source authentication|authentication]] and [[information security#integrity|integrity]] checks allow unauthorized control or data manipulatio
    10 KB (1,453 words) - 05:49, 8 April 2024
  • ...ation. There is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou
    13 KB (2,000 words) - 16:21, 30 March 2024
  • ...rted a company, [[RSA Laboratories]], which became a major player in the [[information security]] industry. [[Ron Rivest | Rivest]] in particular went on to invent additio
    7 KB (1,171 words) - 05:48, 8 April 2024
  • A '''challenge-response protocol''' is a technique for managing [[information security#source authentication|source authentication]].
    2 KB (382 words) - 05:49, 8 April 2024
  • Like any encryption scheme, an OE system must rely on some form of [[information security#source authentication|source authentication]]; it does no good at all to en
    14 KB (2,265 words) - 05:49, 8 April 2024
  • {{r|Federal Information Security Management Act of 2002}}
    5 KB (656 words) - 09:03, 9 August 2023
  • | title = Principles of Information Security, Second Edition
    25 KB (3,794 words) - 05:48, 8 April 2024
  • ...rum of the American Bar Association Section of Antitrust Law's Privacy and Information Security Committee
    5 KB (692 words) - 23:38, 29 September 2020
  • Sometimes called a SAP, but not an information security program as such, is the Personnel Reliability Program (PRP). All personnel
    24 KB (3,594 words) - 05:16, 31 March 2024
  • ...ormation security | information]], [[#personnel security | personnel]], [[#information security | computer]], [[#counter-SIGINT | signals, communications, and electronic
    33 KB (4,816 words) - 08:11, 4 May 2024
  • ...he site also strictly follows requirements of the Privacy Act, the Federal Information Security Management Act, and other privacy and security requirements.
    16 KB (2,514 words) - 09:25, 10 February 2023
  • * Chief Information Security Officer
    19 KB (2,853 words) - 09:20, 22 April 2024
  • '''Steganography''' is an area of information security where the primary goal is to hide a secret message within a carrier. The ca
    11 KB (1,766 words) - 09:26, 31 October 2015
  • ...exploitation threat, and Communications-Electronics works out the detailed Information Security (INFOSEC) and Communications Security (COMSEC) doctrine, in compliance with
    29 KB (4,252 words) - 07:36, 18 March 2024
  • ...als with [[financial system|finance]], it has significant involvement in [[information security]]. ...ve come from trusted employees who should not have been trusted, classic [[information security]] requirements come into play:
    15 KB (2,227 words) - 09:57, 24 November 2009
  • ...of such attacks and defenses against them are beyond our scope here; see [[information security]]. ...ms can be designed to enforce some of these procedures. For details, see [[information security]].
    32 KB (4,913 words) - 14:38, 18 March 2024
  • ...of such attacks and defenses against them are beyond our scope here; see [[information security]]. ...ms can be designed to enforce some of these procedures. For details, see [[information security]].
    32 KB (4,916 words) - 05:49, 8 April 2024
  • ...[[information security#source authentication|source authentication]], or [[information security#integrity|data integrity protection]]. One-way hashes are commonly used to ...technique is used in many security systems, such as [[IPsec]], to ensure [[information security#integrity|data integrity]].
    16 KB (2,641 words) - 15:51, 8 April 2024
  • ...tion]], [[information security#content integrity|content integrity]] and [[information security#content confidentiality|content confidentiality]], at the IP ([[Internet Pr ''IPsec cannot be secure if the system isn't.'' [[Information security]] on IPsec gateway machines is an essential requirement if IPsec is to func
    40 KB (6,219 words) - 05:49, 8 April 2024
  • *More research on information security
    15 KB (2,287 words) - 15:14, 29 March 2024
  • * [[Credentialing (information security)/Definition]] * [[Information security/Definition]]
    28 KB (2,875 words) - 16:19, 7 April 2024
  • * [[Credentialing (information security)/Related Articles]] * [[Information security/Related Articles]]
    36 KB (4,044 words) - 16:22, 7 April 2024
  • * [[Template:Credentialing (information security)/Metadata]] * [[Template:Information security/Metadata]]
    39 KB (4,231 words) - 05:22, 8 April 2024
  • * ISO/IEC TR 17799:2000 Code of Practice for Information Security Management
    14 KB (2,020 words) - 07:32, 20 April 2024
  • 9 KB (1,384 words) - 03:56, 13 September 2009
  • ...domain of cryptography. See [[Information_security#Information_transfer | information security]] for the different types of authentication, and [[#Cryptographic_hash_algo ...'just'' a branch of mathematics. It might also be considered a branch of [[information security]] or of [[engineering]].
    52 KB (8,332 words) - 05:49, 8 April 2024
  • Security, which the [[Federal Information Security Management Act of 2002]] defines as includeing [[availability]], [[confiden
    57 KB (8,399 words) - 17:39, 13 March 2024
  • ...re. See [[hybrid cryptosystem]] for how the components fit together, and [[information security]] for broader issues. * [[SEED (cipher)|SEED]], developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea.
    53 KB (8,371 words) - 05:48, 8 April 2024