Federal Information Security Management Act of 2002/Related Articles
Jump to navigation
Jump to search
- See also changes related to Federal Information Security Management Act of 2002, or pages that link to Federal Information Security Management Act of 2002 or to this page or whose text contains "Federal Information Security Management Act of 2002".
Parent topics
- Federal Information Processing Standard [r]: Add brief definition or description
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Confidentiality [r]: Assurance that information will not be disclosed to unauthorized parties [e]
- Integrity [r]: In information security, the assurance that data retrieved from an information system has the same meaning as when it was entered [e]
- Availability [r]: In the context of providing an information service, the property that authorized users can depend on being able to use it whenever it is needed [e]
- Auditing [r]: Add brief definition or description
Subtopics
- Cloud computing [r]: Use of computer networks, especially the Internet, to access computer resources, operated by a third party; access is on-demand and dynamically assigned — cloud computing differs from managed hosting with resources dedicated to users [e]
- Virtual private network [r]: The emulation of a private Wide Area Network (WAN) facility using IP facilities, including the public Internet or private IP backbones. [e]
- Internet [r]: International "network of networks" that connects computers together through the Internet Protocol Suite and supports applications like Email and the World Wide Web. [e]