Information security/Related Articles: Difference between revisions
Jump to navigation
Jump to search
Pat Palmer (talk | contribs) m (Text replacement - "{{r|Signals intelligence}}" to "") |
Pat Palmer (talk | contribs) m (Text replacement - "{{r|Electronic warfare}}" to "") |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
==Parent topics== | ==Parent topics== | ||
{{r|Risk assessment}} | {{r|Risk assessment}} | ||
Line 11: | Line 11: | ||
{{r|Authentication}} | {{r|Authentication}} | ||
{{r|Classified information}} | {{r|Classified information}} | ||
{{r|Cryptanalysis}} | {{r|Cryptanalysis}} | ||
{{r|Cryptography}} | {{r|Cryptography}} | ||
Line 30: | Line 30: | ||
{{r|Social engineering}} | {{r|Social engineering}} | ||
{{r|Transborder data flow}} | {{r|Transborder data flow}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Bahá'í Faith}} | |||
{{r|NoSQL}} |
Latest revision as of 08:06, 29 November 2024
- See also changes related to Information security, or pages that link to Information security or to this page or whose text contains "Information security".
Parent topics
- Risk assessment [r]: Add brief definition or description
- Privacy [r]: Add brief definition or description
- Auditing [r]: Add brief definition or description
Subtopics
- Access control [r]: Add brief definition or description
- Authentication [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Digital certificate [r]: A means by which the user of a public key can obtain it from a central repository, with high confidence that key is correct and has not been revoked [e]
- Low probability of intercept [r]: Add brief definition or description
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
- Miscreant [r]: One who enters a computer or computer network without authorization by the owner or administrator, regardless of the motivation for entry [e]
- Official Secrets Act [r]: Add brief definition or description
- Bank Secrecy Act [r]: A piece of legislation with a somewhat confusing name, as it is intended to strip secrecy from certain bank customers who engage in possibly illegal activities, suggestive of money laundering or tax evasion [e]
- Health Insurance Portability and Accountability Act [r]: a 1996 U.S. statute protecting the confidentiality of medical records [e]
- Patriot Act [r]: a controversial law expanding the ability of the U.S. government to surveil both U. S. citizens and foreign nationals around the world, passed immediately after the 9/11 attack [e]
- Radio [r]: Transmission and reception of information, which can be voice, data or imagery over electromagnetic radiation in free space (i.e., wireless). The information is modulated onto a carrier wave [e]
- Radar [r]: Acronym for "radio detection and ranging"; a system used to locate a distant object by transmission of radio waves and reception of their reflection. [e]
- Sarbanes-Oxley Act [r]: Enacted in 2002 in response to major accounting scandals resulting in the collapse of major U.S. corporations, a strict set of rules for financial responsibility and audit in public companies; currently being challenged as overkill [e]
- Social engineering [r]: Subverting a security system by deceiving its users. [e]
- Transborder data flow [r]: Add brief definition or description