Security/Related Articles: Difference between revisions
< Security
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} {{TOC|right}} ==Parent topics== {{r|article}} {{r|Formal Title}} --> ==Subtopics== {{r|Information assurance}} {{r|Computer security||**}} {{r|Communications security||**}}...) |
imported>Howard C. Berkowitz No edit summary |
||
Line 3: | Line 3: | ||
{{TOC|right}} | {{TOC|right}} | ||
==Parent topics== | ==Parent topics== | ||
{{r| | {{r|Auditing}} | ||
{{r| | {{r|Law}} | ||
==Subtopics== | ==Subtopics== | ||
{{r|Information assurance}} | {{r|Information assurance}} | ||
Line 16: | Line 15: | ||
==Other related topics== | ==Other related topics== | ||
{{r|Accounting}} | {{r|Accounting}} |
Revision as of 09:56, 27 February 2010
- See also changes related to Security, or pages that link to Security or to this page or whose text contains "Security".
Parent topics
- Auditing [r]: Add brief definition or description
- Law [r]: Body of rules of conduct of binding legal force and effect, prescribed, recognized, and enforced by a controlling authority. [e]
Subtopics
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Computer security [r]: Computer security is a branch of technology known as information security as applied to computers. [e]
- Communications security [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Physical security [r]: Add brief definition or description
- Accounting [r]: The process of recording transactions within a business, almost always the double-entry method today. [e]