Search results
Jump to navigation
Jump to search
- {{r|Information Security}}1 KB (161 words) - 08:37, 4 May 2024
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:52, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002/Definition]]76 bytes (8 words) - 08:52, 13 September 2009
- [[Signals intelligence]] and [[information security]] organization of [[Australia]]119 bytes (11 words) - 21:20, 22 May 2010
- {{r|Information security}}364 bytes (43 words) - 05:34, 15 March 2024
- #REDIRECT [[Federal Information Security Management Act of 2002/Related Articles]]82 bytes (9 words) - 08:52, 13 September 2009
- ...ce, such as a serial or [[USB]] port, which serves as an [[authentication (information security)|authenticator]] requiring no human involvement once connected; contains un387 bytes (53 words) - 11:23, 7 May 2010
- [[Australia]]'s organization responsible for [[signals intelligence]] and [[information security]]134 bytes (13 words) - 16:17, 22 December 2008
- {{r|Information security}}257 bytes (31 words) - 20:11, 22 February 2009
- ...tion, in the government of [[New Zealand]], which has responsibility for [[information security]] and [[signals intelligence]]174 bytes (20 words) - 16:16, 22 December 2008
- A block cipher developed by the Korean Information Security Agency, used broadly throughout South Korean industry, but seldom found els179 bytes (23 words) - 06:59, 1 October 2009
- ...the alignment of a system's function and user expectation with respect to information security.159 bytes (21 words) - 12:05, 11 July 2010
- {{r|Information security}}220 bytes (27 words) - 02:40, 4 March 2010
- '''Confidentiality''', with respect to [[information security]], is the assurance that it will not be disclosed to unauthorized individua725 bytes (96 words) - 13:27, 30 September 2009
- ...The Dipartimento delle Informazioni per la Sicurezza (DIS, "Department of Information Security"), is the secretariat for the CISR, but also is the custodian of informati1 KB (168 words) - 07:29, 18 March 2024
- {{r|Information security}}322 bytes (42 words) - 20:55, 11 April 2009
- {{r|Information security}}1 KB (173 words) - 14:49, 4 April 2024
- In [[information security]], the processes of [[identification, authentication and credentialing]] ar2 KB (292 words) - 14:55, 20 May 2010
- {{r|Information security}}2 KB (194 words) - 14:48, 4 April 2024
- In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that may or may not reside in a single physical computer. Large *A substitute for information security administration1 KB (190 words) - 05:48, 8 April 2024
- {{r|Information security}}814 bytes (105 words) - 18:35, 11 January 2010
- {{r|Federal Information Security Management Act of 2002}}1 KB (142 words) - 11:26, 6 February 2011
- '''Integrity''', in [[information security]], refers to the assurance that data retrieved from an information system h844 bytes (119 words) - 15:23, 30 September 2009
- A [[communications intelligence]] and [[information security]] organization in Russia, which became independent of the [[KGB]] at the en242 bytes (34 words) - 21:21, 22 May 2010
- {{r|Information security}}428 bytes (56 words) - 08:52, 13 September 2009
- ...ntral Security Service''', who has authority over the military services' [[information security]] and [[signals intelligence]] units. ...then two principal chiefs, one for signals intelligence and the other for information security.2 KB (249 words) - 21:34, 26 May 2024
- {{rpl|Information security||**}}437 bytes (60 words) - 07:12, 5 March 2010
- {{r|Information security}}678 bytes (84 words) - 15:58, 11 January 2010
- {{r|Information security}}1 KB (133 words) - 21:04, 11 January 2010
- ...m for information security#source authentication|source authentication and information security#integrity|data integrity protection; during a conversation, both players ar1 KB (174 words) - 07:34, 18 March 2024
- ...ed device that generates a device-specific, time-variant [[authentication (information security)|authentication code]], to be validated by an authentication server in comb263 bytes (37 words) - 11:15, 7 May 2010
- ...F)''' is a area with extremely high standards of physical, electronic, and information security, such that it meets the criteria for [[classified information]] subject to4 KB (639 words) - 05:49, 8 April 2024
- 2 KB (319 words) - 21:41, 25 June 2010
- {{r|Information security}}689 bytes (85 words) - 14:31, 22 March 2024
- {{r|Information security}}263 bytes (30 words) - 02:42, 30 November 2008
- '''Availability''' of an information service, in the context of [[information security]] means that authorized users can depend on being able to use it whenever i868 bytes (139 words) - 16:34, 10 June 2010
- ...fic background for a broad range of activities in signals intelligence and information security.848 bytes (113 words) - 16:46, 25 March 2024
- {{r|Information security}}248 bytes (31 words) - 12:03, 28 December 2010
- {{r|Information security}}200 bytes (24 words) - 17:14, 22 February 2009
- {{r|Information security}}1 KB (163 words) - 02:30, 3 February 2010
- {{r|Information security}}211 bytes (24 words) - 15:26, 30 September 2009
- {{r|Information security}}352 bytes (42 words) - 14:59, 20 March 2024
- {{r|Information security}}133 bytes (14 words) - 18:50, 7 February 2009
- * ''Principles of Information Security, Second Edition'', book by Whitman, M. & Mattord, H., 2005, published by Th506 bytes (74 words) - 16:53, 9 December 2008
- {{r|Information security}}455 bytes (56 words) - 10:13, 7 February 2009
- '''SEED''' is a [[block cipher]] developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea. It is a 16-round [[Feistel cipher435 bytes (67 words) - 05:48, 8 April 2024
- 3 KB (449 words) - 21:17, 25 May 2024
- 3 KB (516 words) - 07:30, 18 March 2024