Information security/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: {{subpages}} ==Parent topics== {{r|Electronic warfare}} {{r|Signals intelligence}} {{r|Risk assessment}} {{r|Privacy}} {{r|Auditing}} ==Subtopics== {{r|Access control}} {{r|Authenticati...)
 
m (Text replacement - "{{r|Compartmented control system}}" to "")
 
(5 intermediate revisions by 3 users not shown)
Line 3: Line 3:
==Parent topics==
==Parent topics==
{{r|Electronic warfare}}
{{r|Electronic warfare}}
{{r|Signals intelligence}}
 
{{r|Risk assessment}}
{{r|Risk assessment}}
{{r|Privacy}}   
{{r|Privacy}}   
Line 11: Line 11:
{{r|Authentication}}
{{r|Authentication}}
{{r|Classified information}}
{{r|Classified information}}
{{r|Compartmented control system}}
 
{{r|Cryptanalysis}}
{{r|Cryptanalysis}}
{{r|Cryptography}}
{{r|Cryptography}}
{{r|Digital certificate}}
{{r|Digital certificate}}
{{r|Direction finding}}
 
{{r|Low probability of intercept}}
{{r|Low probability of intercept}}
{{r|Malware}}
{{r|Malware}}
{{r|Miscreant}}
{{r|Miscreant}}
{{r|Official Secrets Act}}
{{r|Official Secrets Act}}
{{r|Traffic analysis}}
 
==Other related topics==
==Other related topics==
{{r|Bank Secrecy Act}}
{{r|Bank Secrecy Act}}
{{r|Health Insurance Portability and Accountability Act}}
{{r|Health Insurance Portability and Accountability Act}}
{{r|PATRIOT Act}}
{{r|Patriot Act}}
{{r|Radio}}
{{r|Radio}}
{{r|Radar}}
{{r|Radar}}
Line 30: Line 30:
{{r|Social engineering}}
{{r|Social engineering}}
{{r|Transborder data flow}}
{{r|Transborder data flow}}
==Articles related by keyphrases (Bot populated)==
{{r|Bahá'í Faith}}
{{r|NoSQL}}

Latest revision as of 10:42, 2 September 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Information security.
See also changes related to Information security, or pages that link to Information security or to this page or whose text contains "Information security".

Parent topics

  • Electronic warfare [r]: A subset of information operations that deals with the use of electromagnetic or kinetic means to degrade an enemy's military electronics systems, to be able to operate one's own electronics in the face of enemy attacks, and to evade those attacks through protection or deception [e]

Subtopics

Other related topics

  • Bank Secrecy Act [r]: A piece of legislation with a somewhat confusing name, as it is intended to strip secrecy from certain bank customers who engage in possibly illegal activities, suggestive of money laundering or tax evasion [e]
  • Health Insurance Portability and Accountability Act [r]: a 1996 U.S. statute protecting the confidentiality of medical records [e]
  • Patriot Act [r]: a controversial law expanding the ability of the U.S. government to surveil both U. S. citizens and foreign nationals around the world, passed immediately after the 9/11 attack [e]
  • Radio [r]: Transmission and reception of information, which can be voice, data or imagery over electromagnetic radiation in free space (i.e., wireless). The information is modulated onto a carrier wave [e]
  • Radar [r]: Acronym for "radio detection and ranging"; a system used to locate a distant object by transmission of radio waves and reception of their reflection. [e]
  • Sarbanes-Oxley Act [r]: Enacted in 2002 in response to major accounting scandals resulting in the collapse of major U.S. corporations, a strict set of rules for financial responsibility and audit in public companies; currently being challenged as overkill [e]
  • Social engineering [r]: Subverting a security system by deceiving its users. [e]
  • Transborder data flow [r]: Add brief definition or description

Articles related by keyphrases (Bot populated)