Information security/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Meg Taylor No edit summary |
Pat Palmer (talk | contribs) m (Text replacement - "{{r|Direction finding}}" to "") |
||
Line 15: | Line 15: | ||
{{r|Cryptography}} | {{r|Cryptography}} | ||
{{r|Digital certificate}} | {{r|Digital certificate}} | ||
{{r|Low probability of intercept}} | {{r|Low probability of intercept}} | ||
{{r|Malware}} | {{r|Malware}} |
Revision as of 07:09, 22 June 2024
- See also changes related to Information security, or pages that link to Information security or to this page or whose text contains "Information security".
Parent topics
- Electronic warfare [r]: Add brief definition or description
- Signals intelligence [r]: Add brief definition or description
- Risk assessment [r]: Add brief definition or description
- Privacy [r]: Add brief definition or description
- Auditing [r]: Add brief definition or description
Subtopics
- Access control [r]: Add brief definition or description
- Authentication [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Compartmented control system [r]: Add brief definition or description
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Digital certificate [r]: A means by which the user of a public key can obtain it from a central repository, with high confidence that key is correct and has not been revoked [e]
- Low probability of intercept [r]: Add brief definition or description
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
- Miscreant [r]: One who enters a computer or computer network without authorization by the owner or administrator, regardless of the motivation for entry [e]
- Official Secrets Act [r]: Add brief definition or description
- Traffic analysis [r]: Add brief definition or description
- Bank Secrecy Act [r]: A piece of legislation with a somewhat confusing name, as it is intended to strip secrecy from certain bank customers who engage in possibly illegal activities, suggestive of money laundering or tax evasion [e]
- Health Insurance Portability and Accountability Act [r]: a 1996 U.S. statute protecting the confidentiality of medical records [e]
- Patriot Act [r]: a controversial law expanding the ability of the U.S. government to surveil both U. S. citizens and foreign nationals around the world, passed immediately after the 9/11 attack [e]
- Radio [r]: Add brief definition or description
- Radar [r]: Add brief definition or description
- Sarbanes-Oxley Act [r]: Add brief definition or description
- Social engineering [r]: Add brief definition or description
- Transborder data flow [r]: Add brief definition or description