Search results
Jump to navigation
Jump to search
Page title matches
- ...ation. There is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou13 KB (2,000 words) - 16:21, 30 March 2024
- #Redirect [[Information security]]34 bytes (3 words) - 20:16, 24 October 2008
- In [[information security]], the processes of [[identification, authentication and credentialing]] ar2 KB (292 words) - 14:55, 20 May 2010
- 31 bytes (4 words) - 05:36, 15 March 2024
- 319 bytes (41 words) - 08:45, 13 September 2009
- ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]299 bytes (36 words) - 11:15, 6 May 2010
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- 686 bytes (86 words) - 21:24, 30 November 2013
- ...firm one's [[identification (information security)|identification]] to a [[information security|secure information system]]162 bytes (18 words) - 11:12, 6 May 2010
- {{r|Information security}} {{r|Identification (information security)}}368 bytes (39 words) - 05:38, 15 March 2024
- {{r|Information security}} {{r|RADIUS (information security)}}558 bytes (60 words) - 10:08, 4 May 2022
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:52, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002/Definition]]76 bytes (8 words) - 08:52, 13 September 2009
- ...(FISMA), was passed to support the [[E-Government Act of 2002]]. Without [[information security]], it is impossible for government to deliver reliable services through ele ##ISO 27000 series information security management standards20 KB (2,779 words) - 13:29, 20 March 2023
- #REDIRECT [[Federal Information Security Management Act of 2002/Related Articles]]82 bytes (9 words) - 08:52, 13 September 2009
- 185 bytes (24 words) - 08:52, 13 September 2009
- 2 KB (178 words) - 11:59, 20 September 2009
- {{r|Information security}}428 bytes (56 words) - 08:52, 13 September 2009
Page text matches
- ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]299 bytes (36 words) - 11:15, 6 May 2010
- 234 bytes (24 words) - 14:55, 26 February 2010
- ...firm one's [[identification (information security)|identification]] to a [[information security|secure information system]]162 bytes (18 words) - 11:12, 6 May 2010
- {{r|Information security}} {{r|RADIUS (information security)}}558 bytes (60 words) - 10:08, 4 May 2022
- #REDIRECT [[Authentication (information security)#Security token]]66 bytes (6 words) - 16:13, 6 May 2010
- [[Information security]] strategies and technologies that continue to ensure security without depe180 bytes (20 words) - 13:01, 16 March 2010
- Describes the manufacture and sale of information security products which instill in the consumer a false sense of security, because i237 bytes (35 words) - 14:55, 25 October 2008
- {{r|Information security}} {{r|Identification (information security)}}368 bytes (39 words) - 05:38, 15 March 2024
- '''Information assurance''', or sometimes '''information security''', is a broad term that includes both communications security and computer Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules, for the a2 KB (232 words) - 16:21, 30 March 2024
- '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.149 bytes (20 words) - 11:59, 22 June 2008
- Department of Information Security for [[Italy|Italian]] intelligence, responsible for security clearances and190 bytes (23 words) - 19:49, 4 July 2009
- {{r|Information security}}379 bytes (41 words) - 18:24, 31 January 2009
- In [[information security]], the assurance that data retrieved from an information system has the sam169 bytes (24 words) - 15:24, 30 September 2009
- {{r|Information security}}356 bytes (42 words) - 10:42, 3 September 2008
- #REDIRECT [[Information security]]34 bytes (3 words) - 23:06, 21 April 2010
- #Redirect [[Information security]]34 bytes (3 words) - 20:16, 24 October 2008
- {{r|Information security||**}}558 bytes (70 words) - 14:29, 26 February 2010
- {{r|Information security}} {{r|RADIUS (information security)}}231 bytes (29 words) - 13:28, 1 February 2009
- '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s. The objective of computer security varies a2 KB (267 words) - 05:49, 8 April 2024
- {{r|Information security}} {{r|Federal Information Security Management Act}}342 bytes (47 words) - 14:35, 30 September 2009
- {{r|Information Security}}1 KB (161 words) - 08:37, 4 May 2024
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:52, 13 September 2009
- [[Signals intelligence]] and [[information security]] organization of [[Australia]]119 bytes (11 words) - 21:20, 22 May 2010
- #REDIRECT [[Federal Information Security Management Act of 2002/Definition]]76 bytes (8 words) - 08:52, 13 September 2009
- {{r|Information security}}364 bytes (43 words) - 05:34, 15 March 2024
- #REDIRECT [[Federal Information Security Management Act of 2002/Related Articles]]82 bytes (9 words) - 08:52, 13 September 2009
- ...ce, such as a serial or [[USB]] port, which serves as an [[authentication (information security)|authenticator]] requiring no human involvement once connected; contains un387 bytes (53 words) - 11:23, 7 May 2010
- [[Australia]]'s organization responsible for [[signals intelligence]] and [[information security]]134 bytes (13 words) - 16:17, 22 December 2008
- {{r|Information security}}257 bytes (31 words) - 20:11, 22 February 2009
- ...tion, in the government of [[New Zealand]], which has responsibility for [[information security]] and [[signals intelligence]]174 bytes (20 words) - 16:16, 22 December 2008
- A block cipher developed by the Korean Information Security Agency, used broadly throughout South Korean industry, but seldom found els179 bytes (23 words) - 06:59, 1 October 2009
- ...the alignment of a system's function and user expectation with respect to information security.159 bytes (21 words) - 12:05, 11 July 2010
- {{r|Information security}}220 bytes (27 words) - 02:40, 4 March 2010
- '''Confidentiality''', with respect to [[information security]], is the assurance that it will not be disclosed to unauthorized individua725 bytes (96 words) - 13:27, 30 September 2009
- ...The Dipartimento delle Informazioni per la Sicurezza (DIS, "Department of Information Security"), is the secretariat for the CISR, but also is the custodian of informati1 KB (168 words) - 07:29, 18 March 2024
- {{r|Information security}}322 bytes (42 words) - 20:55, 11 April 2009
- {{r|Information security}}1 KB (173 words) - 14:49, 4 April 2024
- In [[information security]], the processes of [[identification, authentication and credentialing]] ar2 KB (292 words) - 14:55, 20 May 2010
- {{r|Information security}}2 KB (194 words) - 14:48, 4 April 2024
- In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that may or may not reside in a single physical computer. Large *A substitute for information security administration1 KB (190 words) - 05:48, 8 April 2024
- {{r|Information security}}814 bytes (105 words) - 18:35, 11 January 2010
- {{r|Federal Information Security Management Act of 2002}}1 KB (142 words) - 11:26, 6 February 2011
- '''Integrity''', in [[information security]], refers to the assurance that data retrieved from an information system h844 bytes (119 words) - 15:23, 30 September 2009
- A [[communications intelligence]] and [[information security]] organization in Russia, which became independent of the [[KGB]] at the en242 bytes (34 words) - 21:21, 22 May 2010
- {{r|Information security}}428 bytes (56 words) - 08:52, 13 September 2009
- ...ntral Security Service''', who has authority over the military services' [[information security]] and [[signals intelligence]] units. ...then two principal chiefs, one for signals intelligence and the other for information security.2 KB (249 words) - 05:48, 8 April 2024
- {{rpl|Information security||**}}437 bytes (60 words) - 07:12, 5 March 2010
- {{r|Information security}}678 bytes (84 words) - 15:58, 11 January 2010
- {{r|Information security}}1 KB (133 words) - 21:04, 11 January 2010
- ...m for information security#source authentication|source authentication and information security#integrity|data integrity protection; during a conversation, both players ar1 KB (174 words) - 07:34, 18 March 2024
- ...ed device that generates a device-specific, time-variant [[authentication (information security)|authentication code]], to be validated by an authentication server in comb263 bytes (37 words) - 11:15, 7 May 2010
- ...F)''' is a area with extremely high standards of physical, electronic, and information security, such that it meets the criteria for [[classified information]] subject to4 KB (639 words) - 05:49, 8 April 2024
- 2 KB (319 words) - 21:41, 25 June 2010
- {{r|Information security}}689 bytes (85 words) - 14:31, 22 March 2024
- {{r|Information security}}263 bytes (30 words) - 02:42, 30 November 2008
- '''Availability''' of an information service, in the context of [[information security]] means that authorized users can depend on being able to use it whenever i868 bytes (139 words) - 16:34, 10 June 2010
- ...fic background for a broad range of activities in signals intelligence and information security.848 bytes (113 words) - 16:46, 25 March 2024
- {{r|Information security}}248 bytes (31 words) - 12:03, 28 December 2010
- {{r|Information security}}200 bytes (24 words) - 17:14, 22 February 2009
- {{r|Information security}}1 KB (163 words) - 02:30, 3 February 2010
- {{r|Information security}}211 bytes (24 words) - 15:26, 30 September 2009
- {{r|Information security}}352 bytes (42 words) - 14:59, 20 March 2024
- {{r|Information security}}133 bytes (14 words) - 18:50, 7 February 2009
- * ''Principles of Information Security, Second Edition'', book by Whitman, M. & Mattord, H., 2005, published by Th506 bytes (74 words) - 16:53, 9 December 2008
- {{r|Information security}}455 bytes (56 words) - 10:13, 7 February 2009
- '''SEED''' is a [[block cipher]] developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea. It is a 16-round [[Feistel cipher435 bytes (67 words) - 05:48, 8 April 2024
- 3 KB (516 words) - 07:30, 18 March 2024
- 3 KB (451 words) - 18:36, 18 April 2010
- ...oviding [[information security#integrity|data integrity protection]] and [[information security#source authentication|source authentication]]. The term '''HMAC''' is often2 KB (313 words) - 05:49, 8 April 2024
- {{r|Information security}}640 bytes (81 words) - 04:17, 27 April 2010
- {{r|Information security}}578 bytes (75 words) - 02:21, 24 September 2013
- {{r|Information security}}568 bytes (71 words) - 20:51, 11 January 2010
- {{r|Information security}}595 bytes (75 words) - 08:52, 22 April 2024
- ...egal means such as [[Non-Disclosure Agreement]]s, [[classified information|information security classification]] (e.g., SECRET), and contract stipulation can provide legal6 KB (850 words) - 09:34, 7 February 2011
- {{r|Information security}}663 bytes (98 words) - 14:56, 11 July 2010
- ...l system#special access program|Special Access Program (SAP)]], but not an information security program as is typical for SAPs, the PRP complements the security clearance3 KB (426 words) - 03:45, 25 March 2024
- {{r|Information security}}1 KB (133 words) - 09:08, 19 April 2024
- {{r|Information security}}854 bytes (123 words) - 01:07, 2 November 2008
- '''Digital signatures''' provide [[information security#source authentication|source authentication]] for online documents, message2 KB (277 words) - 05:48, 8 April 2024
- {{r|Information security}}1 KB (140 words) - 11:18, 11 January 2010
- [[Information security]] doctrine demands that while SCADA may be sent by IP, if it involves [[cri2 KB (324 words) - 16:37, 22 August 2009
- 8 KB (1,196 words) - 16:22, 30 March 2024
- {{r|Information security}}1 KB (185 words) - 21:09, 22 September 2010
- {{r|Federal Information Security Management Act of 2002}}1 KB (177 words) - 12:27, 5 April 2024
- {{r|Information security}}2 KB (308 words) - 09:08, 19 April 2024
- ...cess, and has testified before Congress and executive agencies such as the Information Security Oversight Office. Aftergood is a member of the advisory board of the Elect5 KB (765 words) - 07:36, 18 March 2024
- ...the RSA system which has since grown into one of the major players in the information security industry.1 KB (195 words) - 07:35, 18 March 2024
- ...ww1.va.gov/vapubs/viewPublication.asp?Pub_ID=50&FType=2 VA Directive 6500 (Information Security Program)]4 KB (517 words) - 14:34, 2 February 2023
- ...used to encrypt the message. Thus, the [[public key]] techniques provide [[information security#source authentication|source authentication]] and [[key management]] servic3 KB (544 words) - 05:49, 8 April 2024
- ...nt is better, and GLBA requires that financial institutions have a written information security plan, which not only covers the personal financial data of customers, but f6 KB (877 words) - 16:10, 22 June 2010
- ...(FISMA), was passed to support the [[E-Government Act of 2002]]. Without [[information security]], it is impossible for government to deliver reliable services through ele ##ISO 27000 series information security management standards20 KB (2,779 words) - 13:29, 20 March 2023
- *[[Public key]] techniques are often used for [[information security#source authentication|source authentication]], to authenticate people or de ...e often authenticated with a [[hashed message authentication code]], for [[information security#integrity|data integrity protection]]. This prevents [[rewrite attack]]s, a6 KB (903 words) - 05:49, 8 April 2024
- * [[SEED (cipher)|SEED]], developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea.4 KB (551 words) - 12:36, 13 April 2016
- [[Information security#source authentication|authentication]] and [[information security#integrity|integrity]] checks allow unauthorized control or data manipulatio10 KB (1,453 words) - 05:49, 8 April 2024
- ...ation. There is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou13 KB (2,000 words) - 16:21, 30 March 2024
- ...rted a company, [[RSA Laboratories]], which became a major player in the [[information security]] industry. [[Ron Rivest | Rivest]] in particular went on to invent additio7 KB (1,171 words) - 05:48, 8 April 2024
- A '''challenge-response protocol''' is a technique for managing [[information security#source authentication|source authentication]].2 KB (382 words) - 05:49, 8 April 2024
- Like any encryption scheme, an OE system must rely on some form of [[information security#source authentication|source authentication]]; it does no good at all to en14 KB (2,265 words) - 05:49, 8 April 2024