Search results
Jump to navigation
Jump to search
Page title matches
- ...heft or corruption, or the preservation of availability, as defined in the security policy. [[Information assurance]] discusses a related topic - how "sure" so ...ive requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie2 KB (267 words) - 05:49, 8 April 2024
- ...and not intended as a rigid standard for every system. The same level of security may be provided in some other way. For example, there is less need for pas 3) required to install all security updates promptly.<br />15 KB (2,320 words) - 18:53, 26 December 2010
- 62 bytes (6 words) - 08:38, 13 April 2010
- 81 bytes (10 words) - 09:47, 31 July 2010
- ...ssible to take a somewhat more manageable view by focusing on contemporary security aspects. The situation is one of [[asymmetrical warfare]]: [[Palestine|Pale3 KB (448 words) - 02:59, 21 February 2010
- ...is not a [[United States cabinet|Cabinet]] position. Because the National Security Advisor has a close relationship with the President they can and do direct ...sidency of [[Richard Nixon]] it was generally recognized that his National Security Advisor, [[Henry Kissinger]] was more important than his [[Secretary of Sta3 KB (300 words) - 16:16, 5 January 2024
- 31 bytes (4 words) - 06:50, 11 March 2024
- #REDIRECT [[Information security]]34 bytes (3 words) - 23:06, 21 April 2010
- ...l staff. With the exception of the Assistant to the President for National Security Affairs, all other NSC members would be either elected officials, or appoin ...Office of the President. With the formation of the Department of Homeland Security, FEMA was absorbed and lost its effective cabinet status.3 KB (374 words) - 16:22, 30 March 2024
- 157 bytes (20 words) - 13:54, 6 July 2008
- 319 bytes (41 words) - 08:45, 13 September 2009
- '''Pakistan's security forces''' are composed of a regular military, several paramilitary organiza ...lry or not, it is real, and has to be dealt with along with other regional security issues.10 KB (1,427 words) - 08:41, 4 May 2024
- ...Security Agency (NSA)''', formally the '''National Security Agency/Central Security Service''' is part of the [[United States Department of Defense]] and also In its name, [[national security]] was selected as deliberately vague and euphemistic; the very existence of72 KB (10,689 words) - 21:34, 26 May 2024
- 146 bytes (22 words) - 10:43, 17 June 2011
- #REDIRECT [[USCG National Security Cutter]]43 bytes (5 words) - 00:36, 17 April 2008
- In [[information security]], the processes of [[identification, authentication and credentialing]] ar *Something you '''have''' (e.g., a [[key (lock)]], [[security token]] or credit card)2 KB (292 words) - 14:55, 20 May 2010
- {{r|Computer security||**}} {{r|Communications security||**}}316 bytes (34 words) - 10:56, 27 February 2010
- ...nds dynamic DNS update even more than did IPv4 dynamic addressing, but DNS security features are needed to secure the updates. With convergence of communicatio DNS software and operations should follow the overall DNS security architecture (DNSSEC).<ref name=RFC4033>{{citation13 KB (2,037 words) - 16:22, 30 March 2024
- ...and strategic focus to the [[American progressivism|progressive]] national security community." It convenes expert groups to create what it considers ideologic | publisher = National Security Network}}</ref>8 KB (1,222 words) - 13:54, 12 May 2024
- 300 bytes (47 words) - 13:47, 1 February 2009
- ...regimes, the German SS did on the Wehrmacht or the Soviet Organs of State Security did on the Red Army. ...egan''), a popularly elected body; he has final command authority over all security forces.8 KB (1,156 words) - 07:31, 18 March 2024
- 62 bytes (6 words) - 18:32, 18 April 2010
- 34 bytes (4 words) - 02:58, 16 February 2009
- #Redirect [[USCG National Security Cutter]]43 bytes (5 words) - 14:22, 19 April 2008
- 31 bytes (4 words) - 05:36, 15 March 2024
- ...does have a world-class intelligence analysis capability in the [[Canadian Security Intelligence Service]]. ...were trained through an exchange program with the [[American]] [[National Security Agency]].2 KB (206 words) - 21:10, 25 May 2024
- 374 bytes (50 words) - 23:07, 17 September 2010
- #REDIRECT [[United Nations Security Council]]45 bytes (5 words) - 13:22, 16 February 2009
- #REDIRECT [[United Nations Security Council]]45 bytes (5 words) - 13:23, 16 February 2009
- 12 bytes (1 word) - 16:59, 8 May 2008
- 107 bytes (10 words) - 08:11, 4 May 2024
- #redirect [[Port Security grant]]33 bytes (4 words) - 11:58, 14 July 2022
- 348 bytes (49 words) - 19:47, 7 March 2024
- 238 bytes (34 words) - 13:42, 6 April 2024
- 12 bytes (1 word) - 17:01, 8 May 2008
- ...and unauthorized information access. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which i :*[[ #Physical security | Physical security]]33 KB (4,816 words) - 08:11, 4 May 2024
- ...at generates a device-specific, time-variant [[authentication (information security)|authentication code]], to be validated by an authentication server in comb263 bytes (37 words) - 11:15, 7 May 2010
- === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).1 KB (200 words) - 17:37, 9 October 2009
- '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.149 bytes (20 words) - 11:59, 22 June 2008
- <!-- Text is transcluded from the Asset backed security/Definition subpage-->90 bytes (12 words) - 05:08, 23 February 2010
- 12 bytes (1 word) - 18:07, 14 November 2007
- Brief description of email security problems and solutions.95 bytes (11 words) - 19:08, 23 September 2009
- ...f Homeland Security|Department of Homeland Security]] has provided '''Port Security Grants''' to ports within the [[United States of America]], to build [[fire The grants are made under the [[Maritime Transportation Security Act of 2002]].<ref name=PortSecurity2015/> The [[Federal Emergency Manageme9 KB (1,108 words) - 08:34, 6 March 2024
- 343 bytes (43 words) - 21:34, 26 May 2024
- {{Security Subgroup}} ::Perhaps it needed definition of the [[Security]] article first? After that, it seemed to work -- although it also could ha3 KB (428 words) - 14:37, 18 March 2024
- 680 bytes (107 words) - 19:11, 23 September 2009
- Auto-populated based on [[Special:WhatLinksHere/Operations security]]. Needs checking by a human. {{r|Intelligence cycle security}}588 bytes (74 words) - 08:11, 4 May 2024
- The [[United States Coast Guard]] (USCG) '''National Security Cutter''' is | title=National Security Cutter (NSC)1 KB (205 words) - 09:54, 14 September 2013
- Under the [[Soviet Union]], the '''Committee for State Security''' (Russian: Комитет государственной безопасн ...of [[Joseph Stalin]], and the attempt to gain control by the head of State Security, [[Lavrenti Beria]], who was executed, the KGB wielded immense power.2 KB (317 words) - 23:12, 8 August 2010
- ...erests, as well as intelligence analysis. CSIS is also responsible for and security screening of government officials. Originally, CSIS fell under the directio ...r II]] and the subsequent [[Cold War]] that saw an expansion of the RCMP's security/intelligence operations. <ref name=RCMP> [http://www.csis-scrs.gc.ca/hstrrt14 KB (2,044 words) - 21:10, 25 May 2024
- ...[identification (information security)|identification]] to a [[information security|secure information system]]162 bytes (18 words) - 11:12, 6 May 2010
- Grants given to purchase modern multi-role fireboats, to enhance national security118 bytes (14 words) - 11:18, 12 July 2022
- ...Security Force''' has been formed to provide integrated at-sea and coastal security. They fill a niche that other military organizations have done as a second ...xample, the [[United States Navy SEALs]] are quite capable of boarding and security, but they are an elite [[special operations]] unit expected to carry the fi1 KB (224 words) - 15:41, 8 April 2024
- ...SCIF]] or other secure working area, which is responsible for ensuring the security of information covered by [[compartmented control system]]s250 bytes (34 words) - 14:49, 31 July 2010
- ...tocol version 6 can run more securely if features of the Internet Protocol security architecture (IPSec)<ref name=RFC4301>{{citation | title = Security Architecture for the Internet Protocol5 KB (761 words) - 16:22, 30 March 2024
- 188 bytes (21 words) - 16:20, 19 April 2024
- * Bamford, James. (1983) ''The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization''. Informative, but ...ord, James. (2002) ''Body of Secrets: Anatomy of the Ultra-Secret National Security Agency''1 KB (159 words) - 15:30, 27 May 2008
- ...tates of America]], chaired by the Assistant to the President for National Security Affairs, and, by extension, the professional staff reporting to the Assista301 bytes (43 words) - 08:34, 21 March 2024
- 164 bytes (22 words) - 11:18, 26 July 2008
- 185 bytes (22 words) - 11:53, 28 July 2009
- ...tion (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]299 bytes (36 words) - 11:15, 6 May 2010
- 827 bytes (133 words) - 23:07, 17 September 2010
- {{r|Security}} ===Transmission security===697 bytes (85 words) - 11:30, 27 February 2010
- A set of extensions to the [[Domain Name System]] to protect it from security threats known at the time139 bytes (22 words) - 12:14, 30 September 2008
- #REDIRECT [[Pakistani Security Forces]]39 bytes (4 words) - 09:29, 15 August 2009
- ...hink tank and interest group, established in 2006, to reform U.S. national security strategy152 bytes (18 words) - 11:47, 19 March 2024
- ...ty Service''', who has authority over the military services' [[information security]] and [[signals intelligence]] units. ...incipal chiefs, one for signals intelligence and the other for information security.2 KB (249 words) - 21:34, 26 May 2024
- Auto-populated based on [[Special:WhatLinksHere/Security Service]]. Needs checking by a human. {{r|Committee for State Security}}622 bytes (78 words) - 08:31, 4 May 2024
- The Canadian government organization responsible for [[communications security]] and [[signals intelligence]]145 bytes (14 words) - 20:49, 6 August 2008
- ...ides external advice of [[arms control]], [[disarmament]], [[international security]] and [[public diplomacy]]. ...s 19 members and is chartered to have up to 25. Board members are national security experts with scientific, military, diplomatic, and political backgrounds. T1 KB (175 words) - 16:00, 1 April 2024
- #redirect [[Port Security grant]]33 bytes (4 words) - 19:55, 12 July 2022
- 213 bytes (25 words) - 08:11, 4 May 2024
- 686 bytes (86 words) - 21:24, 30 November 2013
- #redirect [[Port Security grant]]33 bytes (4 words) - 11:59, 14 July 2022
- 18 bytes (2 words) - 23:36, 15 January 2009
- #REDIRECT [[Government Communications Security Bureau]]55 bytes (5 words) - 08:10, 15 September 2013
- #redirect [[Port Security grant]]33 bytes (4 words) - 11:59, 14 July 2022
- #REDIRECT [[U.S. Department of Homeland Security]]50 bytes (7 words) - 03:08, 31 January 2009
- Auto-populated based on [[Special:WhatLinksHere/Social security]]. Needs checking by a human. {{r|Social Security in the USA}}551 bytes (73 words) - 16:51, 22 March 2023
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- A [[security (finance)|security]] for which the [[collateral (finance)|collateral]] and source of cash flow333 bytes (47 words) - 12:03, 18 March 2010
- ...e combat of the Afghanistan War (2001-2021) is over, and the International Security Assistance Force has a dual mission of improving the Government of the Isla ...itional, and now elected, government of Afghanistan “in the maintenance of security in Kabul and its surrounding areas, so that the Afghan Interim Authority as7 KB (999 words) - 07:30, 18 March 2024
- Auto-populated based on [[Special:WhatLinksHere/National security]]. Needs checking by a human. {{r|National Security Agency}}603 bytes (78 words) - 09:30, 3 May 2024
- 12 bytes (1 word) - 11:58, 9 May 2008
- ...t (i.e., "veto") any Resolution, and a rotating group of nations. Only the Security Council has the authority to order [[peace operations]], economic sanctions Decisions of the UNSC are recorded in [[United Nations Security Council resolutions]].1 KB (163 words) - 10:10, 28 February 2024
- 81 bytes (10 words) - 21:19, 22 May 2010
- Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human. {{r|Internet Protocol security architecture}}815 bytes (100 words) - 15:37, 11 January 2010
- The '''National Security Act of 1947''' restructured the U.S. military from its traditional structur | title = National Security Act of 19472 KB (307 words) - 16:21, 30 March 2024
- 190 bytes (25 words) - 17:07, 17 March 2021
- 176 bytes (22 words) - 17:02, 24 February 2024
- {{r|Security organization of Saddam Hussein}}599 bytes (78 words) - 22:15, 12 August 2010
- ...ditionary Combat Command]] formed to provide integrated at-sea and coastal security.155 bytes (21 words) - 15:54, 15 May 2011
- ...as the [[Transportation Security Administration]] responsible for airline security. In other areas, such as national-level disaster response, it has not resp | author = Department of Homeland Security5 KB (670 words) - 08:41, 4 May 2024
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:52, 13 September 2009
- 81 bytes (10 words) - 11:01, 3 October 2009
- 12 bytes (1 word) - 00:38, 17 April 2008
- 146 bytes (17 words) - 21:56, 12 August 2009
- 170 bytes (17 words) - 15:36, 27 May 2008
- 430 bytes (59 words) - 08:41, 4 May 2024
- 117 bytes (12 words) - 14:30, 1 July 2009
- 94 bytes (9 words) - 09:48, 14 March 2024
- Auto-populated based on [[Special:WhatLinksHere/Domain Name System security]]. Needs checking by a human.685 bytes (89 words) - 16:02, 11 January 2010
- ...d built a complex '''security organization''' to protect him. Parts of the security organization also dealt with extremely sensitive matters such as weapons of ...r's "security squadron", became a "state-within-a-state." Iraq had no key security leader equivalent to Heinrich Himmler, but the Nazis also did not have a tr1 KB (225 words) - 07:36, 18 March 2024
- ...nsive responsibilities in [[intelligence (information gathering)]], border security, counterintelligence and suppression of dissent; split up in the [[Russian387 bytes (49 words) - 08:11, 4 May 2024
- {{r|Stanley Arkin}} Board of advisors, [[National Security Network]] {{r|Richard Clarke}} Board of advisors, [[National Security Network]]2 KB (230 words) - 12:45, 12 May 2024
- {{r|Information security}} {{r|Identification (information security)}}368 bytes (39 words) - 05:38, 15 March 2024
- {{r|Communications Security Establishment}} {{r|Information security}}379 bytes (41 words) - 18:24, 31 January 2009
- ...he United Nations, charged with the maintenance of international peace and security.153 bytes (21 words) - 20:22, 9 September 2009
- ..., Title XVIII (Medicare), Title XIX (Medicaid), and much more. The Social Security retirement program and Medicare are funded by taxes on payrolls, with emplo ...sabled workers. Medicare is a component social insurance program in Social Security, enacted in 1965 and represented by the letter 'H' in the acronym. (The I i9 KB (1,398 words) - 15:40, 22 March 2023
- ...sory panel of the [[U.S. Department of State]], dealing with international security policy, especially [[arms control]]171 bytes (22 words) - 15:24, 14 September 2009
- 70 bytes (8 words) - 16:09, 4 October 2009
- {{r|Information security}} {{r|Security token}}558 bytes (60 words) - 10:08, 4 May 2022
- ...government of [[New Zealand]], which has responsibility for [[information security]] and [[signals intelligence]]174 bytes (20 words) - 16:16, 22 December 2008
- {{r|Operations security}}295 bytes (32 words) - 08:11, 4 May 2024
- 95 bytes (13 words) - 17:59, 11 August 2008
- ...expert, nonpartisan panel to pose questions in the areas of U.S. national security policy: *a new National Security Act of 1947|national security act2 KB (248 words) - 02:39, 21 March 2024
- {{r|Information Security}} {{r|Director, National Security Agency}}1 KB (161 words) - 08:37, 4 May 2024
- ...ited Nations Security Council]] has passed close to 2000 '''United Nations Security Council resolutions'''. | [[United Nations Security Council Resolution 1267|1267]] ||623 bytes (72 words) - 07:29, 9 September 2011
- ...Peace]], and is funded by the [[George Washington University]] [[National Security Archive]] Fund, Inc.579 bytes (82 words) - 21:34, 26 May 2024
- #REDIRECT [[Social Security in the USA]]40 bytes (6 words) - 17:36, 27 September 2007
- ...but also is the custodian of information and is responsible for personnel security clearances. ...mazioni e la Sicurezza Democratica'' (SISDE) (Intelligence and Democratic Security Service),1 KB (168 words) - 07:29, 18 March 2024
- {{r|United Nations Security Council Resolutions}}240 bytes (30 words) - 10:42, 8 July 2023
- #REDIRECT[[U.S. Department of Homeland Security]]49 bytes (7 words) - 04:05, 31 January 2009
- 19 bytes (2 words) - 04:49, 14 April 2011
- 12 bytes (1 word) - 18:10, 14 November 2007
- ...y of Homeland Security''' heads the [[United States Department of Homeland Security]]. In the [[Obama administration]], the incumbent is [[Janet Napolitano]].256 bytes (34 words) - 11:39, 3 February 2009
- ...duate students, and the public, in the field of national and international security268 bytes (35 words) - 10:35, 3 October 2009
- Auto-populated based on [[Special:WhatLinksHere/Director, National Security Agency]]. Needs checking by a human. {{r|National Security Agency}}525 bytes (67 words) - 15:59, 11 January 2010
- #REDIRECT [[National Security Archive, George Washington University]]69 bytes (7 words) - 18:33, 18 November 2009
- Auto-populated based on [[Special:WhatLinksHere/Internet Protocol security architecture]]. Needs checking by a human.500 bytes (62 words) - 17:30, 11 January 2010
- {{r|Communications Security Establishment}}227 bytes (24 words) - 08:11, 4 May 2024
- ...of government records on a wide range of topics pertaining to the national security, foreign, intelligence, and economic policies of the United States. The Arc | title = About the National Security Archive2 KB (330 words) - 08:02, 24 April 2024
- *[http://www.un.org/Docs/sc/ UN Security Council] — official site **[http://www.un.org/Docs/sc/unsc_background.html UN Security Council – Background]1 KB (207 words) - 07:38, 12 February 2009
- 78 bytes (10 words) - 14:27, 1 July 2009
- Auto-populated based on [[Special:WhatLinksHere/USCG National Security Cutter]]. Needs checking by a human.460 bytes (60 words) - 21:12, 11 January 2010
- #REDIRECT [[Federal Information Security Management Act of 2002/Definition]]76 bytes (8 words) - 08:52, 13 September 2009
- ...ns Security Council Resolution|resolution]] passed by the [[United Nations Security Council]] in 1999, which listed individuals believed to be associated with | title = Denied Persons Pursuant to UN Security Council Resolution2 KB (230 words) - 15:04, 15 April 2024
- The multiple security organizations that protected the person, government, and sensitive projects188 bytes (22 words) - 16:11, 4 July 2009
- 319 bytes (47 words) - 21:12, 11 September 2009
- {{r|Under Secretary for Arms Control and International Security}}1 KB (160 words) - 16:00, 1 April 2024
- The [[United Nations Security Council]] has passed close to 2000 resolutions.113 bytes (13 words) - 07:08, 9 September 2011
- {{r|Organs of State Security}} {{r|National Security Agency}}814 bytes (103 words) - 15:32, 7 September 2009
- 100 bytes (13 words) - 21:06, 14 June 2008
- ...intended to elicit ideas about revising the structure of the U.S. national security decisionmaking process258 bytes (36 words) - 02:37, 21 March 2024
- Coalition command charged with training and preparing [[Iraqi Security Forces]]; commanded by LTG [[Michael Barbero]]; reorganized under the deput206 bytes (28 words) - 11:36, 5 March 2010
- 147 bytes (19 words) - 09:55, 14 September 2013
- ...r a prudent national security policy for the United States, addressing the security requirements of both the United States and the State of Israel, and strengt | publisher = Jewish Institute for National Security Affairs}}</ref>3 KB (386 words) - 07:29, 18 March 2024
- A nonprofit, oversight organization to balance claims of national security against human rights and constitutional rights; Advisory Committee, Congres208 bytes (24 words) - 11:37, 19 March 2024
- Over 2000 resolutions have been passed by the [[United Nations Security Council]]117 bytes (14 words) - 20:22, 5 January 2024
- ...America|United States government]] whose primary mission is to protect the security of the nation.218 bytes (30 words) - 03:53, 31 January 2009
- {{r|Afghan Security Forces}}384 bytes (50 words) - 08:19, 27 February 2024
- {{r|National Security Archive, George Washington University||**}}579 bytes (76 words) - 18:32, 18 November 2009
- ...itor, investigate, and submit to congress an annual report on the national security implications of the bilateral trade and economic relationship between the [ *regional economic and security impacts1 KB (208 words) - 14:32, 2 February 2023
- {{r|United Nations Security Council}} {{r|Kosovo, United Nations Security Council Resolutions}}326 bytes (39 words) - 13:26, 5 November 2008
- Cabinet officer who heads the [[United States Department of Homeland Security]]; currently [[Janet Napolitano]]147 bytes (17 words) - 11:41, 3 February 2009
- 566 bytes (69 words) - 10:52, 13 May 2010
- #REDIRECT [[Federal Information Security Management Act of 2002/Related Articles]]82 bytes (9 words) - 08:52, 13 September 2009
- 197 bytes (20 words) - 18:40, 18 November 2009
- 171 bytes (26 words) - 05:14, 22 February 2024
- Auto-populated based on [[Special:WhatLinksHere/Italian intelligence and security services]]. Needs checking by a human.608 bytes (78 words) - 17:35, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/National Security Act of 1947]]. Needs checking by a human. {{r|National Security Agency}}1 KB (177 words) - 08:37, 4 May 2024
- *[[Central Intelligence Agency]] report on Iraq’s Security Services, Regime Strategic Intent - Annex C: https://www.cia.gov/library/re *Ibrahim al-Marashi, Iraq's Security and Intelligence Network: A Guide and Analysis, ''Middle Eastern Review of406 bytes (57 words) - 18:56, 4 July 2009
- Auto-populated based on [[Special:WhatLinksHere/Social Security in the USA]]. Needs checking by a human. {{r|Social security}}720 bytes (98 words) - 15:07, 20 March 2023
- ...of [[Internet]] delivery and [[cloud computing]] immensely complicates the security problem. ...or example, is proposing the "locking down" of desktops as one side of the security architecture; <ref name=MS-WL>{{citation20 KB (2,779 words) - 13:29, 20 March 2023
- {{r|Directorate of Security Affairs (Iraq)}} {{r|Special Security Organization}}588 bytes (73 words) - 08:11, 4 May 2024
- <!-- Text is transcluded from the Organisation for Security and Cooperation in Europe/Definition subpage-->120 bytes (16 words) - 05:09, 3 January 2011
- ...nmann}} Chairman of the Board of Advisors, [[Jewish Institute for National Security Affairs]];1 KB (211 words) - 12:05, 1 May 2024
- ...nounced the creation of the '''Dallaire Centre of Excellence for Peace and Security''' on June 25, 2019.<ref name=MinNatDef2019-06-25/> ...Initiative, will be creating a Dallaire Centre of Excellence for Peace and Security, within the Canadian Defence Academy.2 KB (268 words) - 11:20, 30 March 2023
- {{r|National security}} ...f Peace; Author of Killing Détente; former Director, Committee on National Security; former [[Arms Control and Disarmament Agency]] and Department of Defense s21 KB (3,127 words) - 17:17, 25 December 2009
- ...lated based on [[Special:WhatLinksHere/United States Secretary of Homeland Security]]. Needs checking by a human.583 bytes (76 words) - 21:23, 11 January 2010
- 111 bytes (13 words) - 14:30, 23 November 2009
- {{r|United Nations Security Council Resolutions}}122 bytes (13 words) - 07:05, 9 September 2011
- {{main|National Security Agency}} Declassified [[National Security Agency]] historical documents, prepared by NSA historian Robert Hanyok, giv11 KB (1,683 words) - 05:35, 31 May 2009
- *[[Security assessment and authorization]] *[[Information system security planning|Security planning]]2 KB (178 words) - 11:59, 20 September 2009
- 258 bytes (32 words) - 22:13, 19 April 2012
- #REDIRECT [[National Security Agency and Southeast Asia, 1954-1961]]68 bytes (8 words) - 23:56, 23 August 2008
- 185 bytes (24 words) - 08:52, 13 September 2009
- {{r|Information security}}428 bytes (56 words) - 08:52, 13 September 2009
- 510 bytes (74 words) - 17:33, 12 November 2009
- 127 bytes (15 words) - 14:42, 2 April 2022
- ...Committee on Government Affairs, the '''U.S. Senate Committee on Homeland Security and Governmental Affairs''' has original jurisdiction, according to senate (1) Department of Homeland Security, except matters relating to-3 KB (370 words) - 22:01, 15 September 2013
- U.S. [[signals intelligence]] and [[communications security]] activity prior to major ground commitments140 bytes (16 words) - 09:49, 24 August 2008
- {{r|National Security Agency}}317 bytes (42 words) - 10:04, 24 August 2008
- ...{Subpages}}</noinclude>Committee of the U.S. Senate that received Homeland Security responsibility in 2005, and has long been responsible for a wide range of g256 bytes (34 words) - 10:13, 4 December 2010
- 582 bytes (89 words) - 16:06, 15 April 2024
- A document, the '''National Security Strategy of the United States of America''',<ref name=PDF>{{citation | title = National Security Strategy of the United States of America5 KB (762 words) - 16:57, 29 March 2024
- The key public document on national security strategy, issued by the [[George W. Bush Administration]] between the [[9/1187 bytes (25 words) - 08:41, 23 February 2024
Page text matches
- '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.149 bytes (20 words) - 11:59, 22 June 2008
- ...ited Nations Security Council]] has passed close to 2000 '''United Nations Security Council resolutions'''. | [[United Nations Security Council Resolution 1267|1267]] ||623 bytes (72 words) - 07:29, 9 September 2011
- ...[[National Security Network]]; Guiding Coalition, [[Project for National Security Reform]]; Democratic presidential candidate; General, [[United States Army]449 bytes (53 words) - 11:52, 19 March 2024
- ...p, Atlantic Council; President and CEO, [[Business Executives for National Security]]206 bytes (23 words) - 11:52, 19 March 2024
- {{r|Security}} ===Transmission security===697 bytes (85 words) - 11:30, 27 February 2010
- ...tre on Global Health Security; formerly Assistant Director-General, Health Security and Environment, [[World Health Organization]]203 bytes (23 words) - 14:58, 11 September 2009
- ...f Information Security for [[Italy|Italian]] intelligence, responsible for security clearances and serving as the secretariat for the [[CISR]]190 bytes (23 words) - 19:49, 4 July 2009
- ...irs 1995-1996; study group for the [[Hart-Rudman Commission]] on national security requirements, 1998-2001431 bytes (50 words) - 20:46, 22 August 2009
- ...] (1998-2002). NSC Senior Director for Combating Terrorism at the National Security Council (2002-3)558 bytes (65 words) - 04:34, 21 March 2024
- ==Social Security Administration== ...tory/collectalt.html Social Security History: Arthur J. Altmeyer]," Social Security Administration.1 KB (134 words) - 18:38, 8 June 2010
- ...xecutive Director of the Security Studies Program and Center for Peace and Security Studies431 bytes (55 words) - 14:30, 22 December 2009
- ...ith this transfer, it must be done over. Also, the simple case provides no security either for access to the computers or to the file information as it moves t ==Security==905 bytes (126 words) - 11:04, 11 July 2010
- ...ies, Chinese foreign policy, strategic culture, statecraft, and East Asian security in theory and practice; formerA djunct Assistant Professor and Instructor i460 bytes (56 words) - 15:36, 13 October 2009
- ...ity Studies]]; Partner at James & Hoffman and litigator for the [[National Security Archive, George Washington University]]204 bytes (26 words) - 18:33, 18 November 2009
- ...and Homeland Defense, [[National Security Council]]; Professor of National Security Studies and Director/Founder of the Center for Counterproliferation Researc647 bytes (77 words) - 15:47, 14 September 2009
- *[http://www.un.org/Docs/sc/ UN Security Council] — official site **[http://www.un.org/Docs/sc/unsc_background.html UN Security Council – Background]1 KB (207 words) - 07:38, 12 February 2009
- The position of having sold a borrowed [[security (finance)|security]] or [[derivative]] (usually with the intention of buying it back and retur223 bytes (34 words) - 04:56, 4 December 2012
- ...[[colonel]], retired, [[United States Marine Corps]]; adviser, Center for Security Policy; Institute Fellow, [[Claremont Institute]]426 bytes (56 words) - 13:52, 6 April 2024
- ...ormer Senior Fellow, [[Brookings Institution]]; Bush-Cheney 2004 campaign; security analyst, CNN537 bytes (59 words) - 08:40, 4 May 2024
- ==<div id="Father"></div>Who was "The 'Father' of Social Security?"== ...d "this title less than many others." Witte pointed out that the [[Social Security Act]] was a collaborative undertaking:2 KB (240 words) - 19:47, 31 May 2010
- {{r|Computer security||**}} {{r|Communications security||**}}316 bytes (34 words) - 10:56, 27 February 2010
- ...ng Coalition, [[Project for National Security Reform]]; board, [[American Security Project]]; Senior Vice President for International Affairs, [[U.S. Chamber301 bytes (35 words) - 11:52, 19 March 2024
- ...]], [[national security]] and counterterrorism law); contributor, [[Family Security Matters]], Fox News, [[National Review]], [[Washington Examiner]], Townhall344 bytes (37 words) - 08:41, 4 May 2024
- The primary high-security [[cryptography|cryptographic]] [[communications security]] machine of [[Nazi Germany]]. Unknown to the Germans, it had been substant321 bytes (39 words) - 10:20, 14 June 2010
- *''Aging Gracefully: Ideas to Improve Retirement Security in America'' (2006) *''Saving Social Security: A Balanced Approach'' (2004)262 bytes (28 words) - 16:17, 20 September 2009
- ...taff]] (1984-1986), and was Deputy Assistant to the President for National Security Affairs from 1986-1990 under Presidents Reagan and G.H.W. Bush; [[Henry Kis475 bytes (60 words) - 17:09, 9 October 2009
- ...ecurity without alienation users or encouraging them to find ways to avoid security mechanisms.898 bytes (132 words) - 05:49, 8 April 2024
- *[[Central Intelligence Agency]] report on Iraq’s Security Services, Regime Strategic Intent - Annex C: https://www.cia.gov/library/re *Ibrahim al-Marashi, Iraq's Security and Intelligence Network: A Guide and Analysis, ''Middle Eastern Review of406 bytes (57 words) - 18:56, 4 July 2009
- ...heft or corruption, or the preservation of availability, as defined in the security policy. [[Information assurance]] discusses a related topic - how "sure" so ...ive requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie2 KB (267 words) - 05:49, 8 April 2024
- *[http://www.ssa.gov/history/history.html History section of the Social Security Administration (SSA) web page] ...y.gov/history/cohenwitte.html Edwin E. Witte (1887-1960): Father of Social Security]," reprint from ''Industrial and Labor Relations Review'' 14, No. 1, Octobe819 bytes (113 words) - 18:09, 27 May 2010
- ...artnership for a Secure America]]; Assistant to the President for National Security Affairs, [[Bill Clinton|Clinton Administration]]293 bytes (35 words) - 08:34, 21 March 2024
- ...ministration]] Defense transition team; legislative assistant for national security 2002-2006 for Sen. [[John Kerry]] and defense policy coordinator for Kerry277 bytes (31 words) - 14:25, 22 December 2009
- ...fic Security Affairs]]; former advisory board, [[Center for a New American Security]]; retired [[United States Marine Corps|U.S. Marine Corps]] [[lieutenant ge299 bytes (39 words) - 10:34, 29 March 2024
- {{r|Information Security}} {{r|Director, National Security Agency}}1 KB (161 words) - 08:37, 4 May 2024
- ...l Defense College (Israel)]], responsible for developing and implementing security strategy curriculum549 bytes (65 words) - 01:58, 15 February 2010
- ...formation security products which instill in the consumer a false sense of security, because in reality the product does not make the information any more secu237 bytes (35 words) - 14:55, 25 October 2008
- ...[identification (information security)|identification]] to a [[information security|secure information system]]162 bytes (18 words) - 11:12, 6 May 2010
- {{r|Information security}} {{r|Identification (information security)}}368 bytes (39 words) - 05:38, 15 March 2024
- ...Center and General Counsel of the [[George Washington University National Security Archive]]244 bytes (30 words) - 03:31, 31 August 2009
- ...to the British [[Security Service]], Israeli [[Shin Bet]] or the national security division of the [[Federal Bureau of Investigation]]322 bytes (43 words) - 14:10, 7 September 2009
- {{r|Communications security}} {{r|Communications Security Establishment}}844 bytes (96 words) - 14:48, 4 April 2024
- The position of having bought a [[security (finance)|security]] or [[derivative]] (often with the intention of selling it when its market247 bytes (36 words) - 04:35, 4 December 2012
- === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).1 KB (200 words) - 17:37, 9 October 2009
- ...ligence official, who rose from the [[Cheka]] until becoming Head of State security; managed [[Soviet nuclear program]]; attempted to assume power after the de314 bytes (45 words) - 16:45, 10 February 2024
- ...or KGB). The KGB, in turn, was one of a long sequence of "Organs of State Security" under the Soviet government, and can trace its origin to the [[Okhrana]] o612 bytes (67 words) - 08:11, 4 May 2024
- ...ton D.C.]] law firm of [[Shea and Gardner]] he worked with former National Security Advisor [[Brent Scowcroft]]. Security Advisor2 KB (204 words) - 12:58, 18 February 2024
- {{r|Directorate of Security Affairs (Iraq)}} {{r|Special Security Organization}}588 bytes (73 words) - 08:11, 4 May 2024
- ...contains unique identifier but is usually not time-synchronized as is a [[security token]]; often used to enforce software licensing387 bytes (53 words) - 11:23, 7 May 2010
- ...c Security Task Force (Region V); adviser, [[Jewish Institute for National Security Affairs]]290 bytes (37 words) - 20:11, 17 July 2009
- ...he first director of the [[Social Security in the USA|United States Social Security Administration]]. ...the law. His major contribution here was the 1939 revision of the Social Security Act which introduced an expansion of benefits.881 bytes (134 words) - 06:48, 5 December 2011
- ...American Security]]; Former Senior Director for Defense Policy, [[National Security Council]]; Expert panel, [[Iraq Study Group]]316 bytes (40 words) - 11:52, 19 March 2024
- ...y of Homeland Security''' heads the [[United States Department of Homeland Security]]. In the [[Obama administration]], the incumbent is [[Janet Napolitano]].256 bytes (34 words) - 11:39, 3 February 2009
- {{r|Triangle Institute for Security Studies}} {{r|Center for a New American Security}}531 bytes (75 words) - 11:01, 3 October 2009
- ...and worldwide infrastructure such as [[food security|food]] and [[economic security]]; also a target of [[conspiracy theory|conspiracy theorists]] as a "hidden299 bytes (40 words) - 12:50, 3 November 2010
- ...e staff and Republican Staff Director of the Subcommittee on International Security, Proliferation, and Federal Services, [[U.S. Senate Committee on Government356 bytes (42 words) - 15:59, 14 September 2009
- ...e security task force, created under the authority of the [[United Nations Security Council]] following the [[9/11]] attack, which operates southeast of the [[343 bytes (48 words) - 08:41, 23 February 2024
- A [[security (finance)|security]] for which the [[collateral (finance)|collateral]] and source of cash flow333 bytes (47 words) - 12:03, 18 March 2010
- Located in [[New York, New York|New York City]], a US [[national security]] think tank that evaluates through the viewpoint of the theory of [[realis * Forum on Asia-Pacific Security334 bytes (48 words) - 11:47, 19 March 2024
- ...Mongolia in the Office of the Under Secretary of Defense for International Security Affairs during the first George W. Bush administration.366 bytes (50 words) - 17:18, 12 November 2009
- {{r|Information security||**}} {{r|Computer security||***}}558 bytes (70 words) - 14:29, 26 February 2010
- ...and Security Committee, Constitution Project; Founding Director, Law and Security Program at [[Human Rights First]], 2003-2006; Clerk to Justice John Paul St416 bytes (52 words) - 11:35, 19 March 2024
- {{r|Israeli intelligence and security services}} ===Other Israeli security services===439 bytes (55 words) - 08:41, 4 May 2024
- ...ecurity Reform]], Counselor, Council on Foreign Relations; Deputy National Security Advisor for Strategic Planning, Presidential Envoy to Iraq and Coordinator390 bytes (50 words) - 12:01, 19 March 2024
- ...yield to maturity). Calculated as the [[internal rate of return]] of the security.334 bytes (49 words) - 05:22, 5 February 2010
- ...ied price on a given date. Used as a way of borrowing or lending using the security as collateral. (The interest rate charged is known as the "repo rate").285 bytes (50 words) - 15:39, 17 October 2009
- ...r, [[Jewish Institute for National Security Affairs]]; advisor, Center for Security Policy387 bytes (45 words) - 13:52, 6 April 2024
- {{r|Social Security}} {{r|Social Security in the USA}}553 bytes (78 words) - 18:38, 8 June 2010
- ...nsive responsibilities in [[intelligence (information gathering)]], border security, counterintelligence and suppression of dissent; split up in the [[Russian387 bytes (49 words) - 08:11, 4 May 2024
- ...Peace]], and is funded by the [[George Washington University]] [[National Security Archive]] Fund, Inc.579 bytes (82 words) - 21:34, 26 May 2024
- ...he department responsible for advancing the national, economic, and energy security of the United States. It was formed in 1977 to consolidate government agen ...ls over security lapses related to nuclear weapons, the [[National Nuclear Security Administration]] (NNSA) was established in 2000, as a "separately organized2 KB (210 words) - 03:41, 25 March 2024
- ...ajor general]], [[U.S. Army]], retired; last assignment was training Iraqi security forces; retired in protest over [[Donald Rumsfeld]]'s policies and went pub399 bytes (54 words) - 03:39, 5 October 2009
- ===Trust and security=== {{r|Federal Information Security Management Act of 2002}}1 KB (142 words) - 11:26, 6 February 2011
- ...8; advisor, [[Jewish Institute for National Security Affairs]]; Center for Security Policy; appointed by [[George W. Bush]] to the U.S. Delegation to the [[U.N658 bytes (86 words) - 13:52, 6 April 2024
- ...); advisor, [[Jewish Institute for National Security Affairs]], Center for Security Policy407 bytes (54 words) - 13:52, 6 April 2024
- Auto-populated based on [[Special:WhatLinksHere/Security Service]]. Needs checking by a human. {{r|Committee for State Security}}622 bytes (78 words) - 08:31, 4 May 2024
- ...er guarantees the sale at a stipulated price of a stipulated volume of the security. (iii) The provision of insurance of an [[asset]].334 bytes (53 words) - 17:05, 18 March 2010
- {{r|Information security}} {{r|Network security}}257 bytes (31 words) - 20:11, 22 February 2009
- ...a senior associate White House counsel and legal adviser to the [[National Security Council]], [[George W. Bush Administration]]429 bytes (57 words) - 12:01, 19 March 2024
- {{r|United Nations Security Council}} {{r|Kosovo, United Nations Security Council Resolutions}}326 bytes (39 words) - 13:26, 5 November 2008
- ...stitute for Public Policy]] National Security Advisory Council, Center for Security Policy; [[U.S. Department of State]] [[Arms Control and Nonproliferation Ad404 bytes (48 words) - 13:52, 6 April 2024
- * [[Army Security Agency]], a fore-runner of the [[National Security Agency]]393 bytes (46 words) - 12:54, 31 May 2009
- ...airman,[[Subcommittee on Technical and Tactical Intelligence]] ([[National Security Agency]] is in his district), [[Subcommittee on Terrorism, Human Intelligen785 bytes (87 words) - 08:59, 6 May 2024
- ...]] (1994-2001); Senior Advisor and Director for Security Affairs (National Security and Defense) [[Coalition Provisional Authority]], 2003449 bytes (54 words) - 16:57, 29 March 2024
- ...erica''' focuses on recreating the bipartisan center in American national security and foreign policy. ...terness dangerously interferes with substantive discussion of our national security and foreign policy.998 bytes (138 words) - 12:43, 8 May 2024
- #REDIRECT [[Better than nothing security]]42 bytes (5 words) - 21:08, 13 September 2010
- #REDIRECT [[Better than nothing security]]42 bytes (5 words) - 09:01, 3 March 2010
- ...board member, BaE Systems; Secretary of the [[U.S. Department of Homeland Security]] (2005-2009); Judge, [[United States Court of Appeals for the Third Circui481 bytes (59 words) - 07:08, 22 March 2024
- ...is not a [[United States cabinet|Cabinet]] position. Because the National Security Advisor has a close relationship with the President they can and do direct ...sidency of [[Richard Nixon]] it was generally recognized that his National Security Advisor, [[Henry Kissinger]] was more important than his [[Secretary of Sta3 KB (300 words) - 16:16, 5 January 2024
- {{r|Email security}} {{r|Transport Layer Security|Transport Layer Security (TLS) }}541 bytes (71 words) - 18:46, 29 October 2009
- #REDIRECT [[Information security]]34 bytes (3 words) - 23:06, 21 April 2010
- #REDIRECT [[Social security]]29 bytes (3 words) - 17:07, 27 September 2007
- #REDIRECT [[Operations security]]33 bytes (3 words) - 09:38, 16 July 2009
- #REDIRECT [[Security Service]]30 bytes (3 words) - 19:48, 5 June 2008
- #Redirect [[Information security]]34 bytes (3 words) - 20:16, 24 October 2008
- #REDIRECT [[Security Service]]30 bytes (3 words) - 19:51, 5 June 2008
- #REDIRECT [[Security Service]]30 bytes (3 words) - 00:07, 12 June 2008
- {{r|Information security}} {{r|Network security}}220 bytes (27 words) - 02:40, 4 March 2010
- ...posts at [[Department of Homeland Security]]; former Director of Homeland Security, [[Lockheed Martin]]517 bytes (63 words) - 22:24, 25 March 2024
- ...ides external advice of [[arms control]], [[disarmament]], [[international security]] and [[public diplomacy]]. ...s 19 members and is chartered to have up to 25. Board members are national security experts with scientific, military, diplomatic, and political backgrounds. T1 KB (175 words) - 16:00, 1 April 2024
- ...does have a world-class intelligence analysis capability in the [[Canadian Security Intelligence Service]]. ...were trained through an exchange program with the [[American]] [[National Security Agency]].2 KB (206 words) - 21:10, 25 May 2024
- ...t Programme (EEDP), including Promoting Climate Security, Enabling Energy Security and Strengthening Sustainable Development Solutions; ...ic health|Global Health Security]], [[international law]], [[international security]], the [[Middle East]] and [[North Africa]] and [[Russia]] and [[Eurasia]].1 KB (188 words) - 07:31, 20 April 2024
- #REDIRECT [[Domain Name System security]]41 bytes (5 words) - 08:26, 3 October 2008
- #REDIRECT [[Domain Name System security]]41 bytes (5 words) - 10:12, 3 October 2008
- #REDIRECT [[National Security Council]]39 bytes (4 words) - 21:03, 28 May 2008
- #REDIRECT [[National Security Agency]]38 bytes (4 words) - 00:09, 27 May 2008
- #redirect [[Port Security grant]]33 bytes (4 words) - 19:55, 12 July 2022
- #redirect [[Port Security grant]]33 bytes (4 words) - 18:18, 3 March 2022
- #redirect [[Port Security grant]]33 bytes (4 words) - 11:58, 14 July 2022
- #REDIRECT [[Pakistani Security Forces]]39 bytes (4 words) - 09:29, 15 August 2009
- #redirect [[Port Security grant]]33 bytes (4 words) - 11:59, 14 July 2022
- #redirect [[Port Security grant]]33 bytes (4 words) - 11:59, 14 July 2022
- ...ns Security Council Resolution|resolution]] passed by the [[United Nations Security Council]] in 1999, which listed individuals believed to be associated with | title = Denied Persons Pursuant to UN Security Council Resolution2 KB (230 words) - 15:04, 15 April 2024
- {{r|Information security}} {{r|RADIUS (information security)}}231 bytes (29 words) - 13:28, 1 February 2009
- ...Secretary of Defense,His research interests include terrorism and national security strategy, political theory and military history; author of ''Last in Their449 bytes (62 words) - 00:05, 25 August 2009
- ...r School of Law and Diplomacy, Tufts University]]; Member, [[International Security Advisory Board]], [[United States Department of State]]; member, [[Committ462 bytes (60 words) - 19:53, 20 May 2010
- ===Security=== {{r|U.S. Department of Homeland Security}}1 KB (149 words) - 09:30, 3 May 2024
- ...nmental Programs; Past Massachusetts Under Secretary of State for Homeland Security; (on leave) Lecturer in Public Policy and former Executive Director, Belfer497 bytes (60 words) - 02:37, 21 March 2024
- ==Security==684 bytes (99 words) - 08:15, 24 February 2024
- ...onal Security Reform]]; [[Assistant Secretary of Defense for International Security Affairs]] (1993-1996)441 bytes (52 words) - 19:06, 3 January 2010
- #REDIRECT [[Committee for State Security]]42 bytes (5 words) - 22:57, 24 August 2008
- #REDIRECT [[Director, National Security Agency]]48 bytes (5 words) - 20:06, 27 May 2008
- #REDIRECT [[International Security Advisory Board]]51 bytes (5 words) - 11:02, 15 September 2009
- #REDIRECT [[Government Communications Security Bureau]]55 bytes (5 words) - 08:10, 15 September 2013
- #REDIRECT [[International Security Assistance Force]]53 bytes (5 words) - 20:11, 23 July 2009
- #REDIRECT [[Internet Protocol security architecture]]53 bytes (5 words) - 14:10, 3 September 2008
- #REDIRECT [[United Nations Security Council]]45 bytes (5 words) - 13:22, 16 February 2009
- #REDIRECT [[USCG National Security Cutter]]43 bytes (5 words) - 00:36, 17 April 2008
- #REDIRECT [[United Nations Security Council]]45 bytes (5 words) - 13:23, 16 February 2009
- #Redirect [[USCG National Security Cutter]]43 bytes (5 words) - 14:22, 19 April 2008
- #REDIRECT [[Committee for State Security]]42 bytes (5 words) - 22:57, 24 August 2008
- #REDIRECT [[Director, National Security Agency]]48 bytes (5 words) - 20:05, 27 May 2008
- In [[information security]], the processes of [[identification, authentication and credentialing]] ar *Something you '''have''' (e.g., a [[key (lock)]], [[security token]] or credit card)2 KB (292 words) - 14:55, 20 May 2010
- ...ity]]; assistant Democratic Whip; advisor, [[Jewish Institute for National Security Affairs]]; 0% "true liberal" 2008 rating from [[American Conservative Union512 bytes (61 words) - 15:23, 8 April 2023
- {{r|Information security}} {{r|Network security}}322 bytes (42 words) - 20:55, 11 April 2009
- ...ter]] law firm, advising major defense and aerospace companies on national security and government contract matters, and on [[government secrecy]]; General Cou471 bytes (61 words) - 19:59, 6 October 2009
- #REDIRECT[[U.S. Department of Homeland Security]]49 bytes (7 words) - 03:40, 31 January 2009
- #REDIRECT [[Social Security in the USA]]40 bytes (6 words) - 17:36, 27 September 2007
- #REDIRECT[[U.S. Department of Homeland Security]]49 bytes (7 words) - 04:05, 31 January 2009
- #REDIRECT [[United Nations Security Council resolutions]]57 bytes (6 words) - 13:21, 5 November 2008
- #REDIRECT [[National Security Agency#1950s programs]]53 bytes (6 words) - 11:14, 10 March 2009
- #REDIRECT [[National Security Agency#1950s programs]]53 bytes (6 words) - 11:14, 10 March 2009
- #REDIRECT [[National Security Agency#1950s programs]]53 bytes (6 words) - 11:15, 10 March 2009
- #REDIRECT [[National Security Agency#1950s programs]]53 bytes (6 words) - 11:15, 10 March 2009
- #REDIRECT [[U.S. Department of Homeland Security]]50 bytes (7 words) - 03:08, 31 January 2009
- ===National security===734 bytes (90 words) - 12:38, 3 December 2023
- *"The Future of Social Security in America." ''The Social Service Review'' (1953). *"The Wisconsin Idea and Social Security." ''The Wisconsin Magazine of History'' 42, no. 1 (Autumn 1958): 19-25.2 KB (292 words) - 13:30, 7 December 2012
- {{r|Information security}} {{r|Federal Information Security Management Act}}342 bytes (47 words) - 14:35, 30 September 2009
- ...Security Law, American Center for Law and Justice,specializing in national security law and First Amendment Law; faculties of the School of Law and the Roberts404 bytes (59 words) - 06:01, 24 March 2024
- Board of advisors, [[National Security Network]]84 bytes (9 words) - 12:26, 4 October 2009
- #REDIRECT [[Jewish Institute for National Security Affairs]]60 bytes (7 words) - 18:26, 21 July 2009
- #REDIRECT [[National Security Archive, George Washington University]]69 bytes (7 words) - 18:33, 18 November 2009
- #REDIRECT [[Center for a New American Security]]48 bytes (7 words) - 20:52, 4 October 2009
- ...nformation Analysis and Chief of Intelligence, U.S. Department of Homeland Security (2005 – 2007); Assistant Director of Central Intelligence for Collection,435 bytes (48 words) - 10:07, 13 May 2010
- ...tegory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and493 bytes (70 words) - 05:48, 8 April 2024
- ...d built a complex '''security organization''' to protect him. Parts of the security organization also dealt with extremely sensitive matters such as weapons of ...r's "security squadron", became a "state-within-a-state." Iraq had no key security leader equivalent to Heinrich Himmler, but the Nazis also did not have a tr1 KB (225 words) - 07:36, 18 March 2024
- {{r|United Nations Security Council Resolution 242}} {{r|Israel-Palestine security}}484 bytes (64 words) - 14:08, 28 July 2009
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- #REDIRECT [[Organisation for Security and Cooperation in Europe]]65 bytes (8 words) - 22:11, 19 April 2012
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:52, 13 September 2009
- Brief description of email security problems and solutions.95 bytes (11 words) - 19:08, 23 September 2009
- Border security database managed by European governments.93 bytes (10 words) - 07:12, 24 December 2009
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- ...ver Institution]], in foreign and national security policy; first National Security Adviser to [[Ronald Reagan]]; [[Defense Policy Board]] in [[George W. Bush531 bytes (67 words) - 22:24, 25 March 2024
- ...stitution]]; Director of the Center for Peace and Security Studies and the Security Studies Program at [[Georgetown University]] (2003-); Consultant, [[9-11 C470 bytes (62 words) - 09:39, 14 February 2024
- {{r|Stanley Arkin}} Board of advisors, [[National Security Network]] {{r|Richard Clarke}} Board of advisors, [[National Security Network]]2 KB (230 words) - 12:45, 12 May 2024
- {{r|Organs of State Security}} {{r|National Security Agency}}814 bytes (103 words) - 15:32, 7 September 2009
- Under the [[Soviet Union]], the '''Committee for State Security''' (Russian: Комитет государственной безопасн ...of [[Joseph Stalin]], and the attempt to gain control by the head of State Security, [[Lavrenti Beria]], who was executed, the KGB wielded immense power.2 KB (317 words) - 23:12, 8 August 2010
- {{r|Committee for State Security}} {{r|Security Service}}519 bytes (68 words) - 19:32, 12 February 2011
- <!-- Text is transcluded from the Collective security/Definition subpage-->88 bytes (11 words) - 10:44, 17 June 2011
- <!-- Text is transcluded from the Security (finance)/Definition subpage-->87 bytes (11 words) - 08:36, 22 February 2010
- Subverting a security system by deceiving its users.88 bytes (11 words) - 21:06, 3 March 2010
- #REDIRECT [[National Security Agency and Southeast Asia, 1954-1961]]68 bytes (8 words) - 23:56, 23 August 2008
- [[Signals intelligence]] and [[information security]] organization of [[Australia]]119 bytes (11 words) - 21:20, 22 May 2010
- Commissioner, [[U.S.-China Economic and Security Review Commission]];105 bytes (12 words) - 17:20, 12 November 2009
- #REDIRECT [[Federal Information Security Management Act of 2002/Definition]]76 bytes (8 words) - 08:52, 13 September 2009
- ...tudy of weapons of mass destruction]],[[Center for Technology and National Security Policy]], and [[Institute for National Strategic Studies]]522 bytes (69 words) - 16:56, 29 March 2024
- ...and nongovernmental organizations to the host country local government and security forces. PRTs in Afghanistan are under the [[International Security Assistance Force]],<ref>{{citation2 KB (252 words) - 10:33, 22 May 2024
- ...expert, nonpartisan panel to pose questions in the areas of U.S. national security policy: *a new National Security Act of 1947|national security act2 KB (248 words) - 02:39, 21 March 2024
- {{r|Information security}} {{r|Network security}}364 bytes (43 words) - 05:34, 15 March 2024
- ...rd University, 1974-1977; [[United States Navy]], staff of the [[National Security Council]] staff and [[U.S. Senate Select Committee on Intelligence]]521 bytes (67 words) - 02:37, 21 March 2024
- {{r|National Security Agency}} {{r|Special Security Office}}506 bytes (66 words) - 09:46, 31 July 2010
- *[http://www.homelandsecurity.org/journal/ ''Journal of Homeland Security'']197 bytes (20 words) - 10:01, 22 February 2024
- <!-- Text is transcluded from the Asset backed security/Definition subpage-->90 bytes (12 words) - 05:08, 23 February 2010
- #REDIRECT [[Federal Information Security Management Act of 2002/Related Articles]]82 bytes (9 words) - 08:52, 13 September 2009
- Over 2000 resolutions have been passed by the [[United Nations Security Council]]117 bytes (14 words) - 20:22, 5 January 2024
- ...Multi-National Security Transition Command-Iraq]] (MNSTC-I), and the Iraqi Security Forces; Previously, he was the Commanding General of [[I Corps]] at Ft. Lew453 bytes (64 words) - 11:16, 5 March 2010
- ...but also is the custodian of information and is responsible for personnel security clearances. ...mazioni e la Sicurezza Democratica'' (SISDE) (Intelligence and Democratic Security Service),1 KB (168 words) - 07:29, 18 March 2024
- Member, [[International Security Advisory Board]], [[United States Department of State]]124 bytes (13 words) - 15:37, 14 September 2009
- Firm that conducts background checks for individuals who seek security clearances117 bytes (14 words) - 03:02, 3 January 2024
- ...'s organization responsible for [[signals intelligence]] and [[information security]]134 bytes (13 words) - 16:17, 22 December 2008
- Member, [[International Security Advisory Board]], [[United States Department of State]]124 bytes (13 words) - 15:39, 14 September 2009
- a fixed-interest security issued by governments, companies, banks and others.113 bytes (13 words) - 02:54, 6 May 2009
- National security research center at the U.S. [[Naval Postgraduate School]]111 bytes (14 words) - 15:28, 13 October 2009
- ...l staff. With the exception of the Assistant to the President for National Security Affairs, all other NSC members would be either elected officials, or appoin ...Office of the President. With the formation of the Department of Homeland Security, FEMA was absorbed and lost its effective cabinet status.3 KB (374 words) - 16:22, 30 March 2024
- The '''National Security Act of 1947''' restructured the U.S. military from its traditional structur | title = National Security Act of 19472 KB (307 words) - 16:21, 30 March 2024
- ...t to the President and Senior Director for Legislative Affairs, [[National Security Council]] Staff and was Director of Congressional Affairs at the United Sta515 bytes (65 words) - 15:45, 14 September 2009
- ...sity's Kennedy School of Government and faculty chair of the International Security Program at the Belfer Center for Science and International Affairs, Harvard ...''Journal of Cold War Studies,'' and coeditor of the ''Cornell Studies in Security Affairs'', published by Cornell University Press.1 KB (167 words) - 07:36, 18 March 2024
- {{r|Information security}} {{r|Transport Layer Security}}2 KB (194 words) - 14:48, 4 April 2024
- Israeli domestic intelligence, roughly equivalent to the British [[Security Service]] (MI5)127 bytes (14 words) - 13:26, 1 July 2009
- A web site which publishes information on cryptography, freedom, privacy and security.122 bytes (15 words) - 08:44, 6 December 2010
- Security consulting firm whose principals are largely previous high-level government130 bytes (14 words) - 10:02, 13 May 2010
- The Canadian government organization responsible for [[communications security]] and [[signals intelligence]]145 bytes (14 words) - 20:49, 6 August 2008
- Board of Directors, [[National Security Network]]; Senior Adviser, French American Foundation129 bytes (14 words) - 22:41, 30 November 2009
- The [[United Nations Security Council]] has passed close to 2000 resolutions.113 bytes (13 words) - 07:08, 9 September 2011
- {{r|Security management}} {{r|U.S. Department of Homeland Security}}537 bytes (76 words) - 10:10, 13 May 2010
- In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that may or may not reside in a single physical computer. Large *[[Security logging]]1 KB (190 words) - 05:48, 8 April 2024
- ...tlantic Council; [[Institute for Transitional Democracy and International Security]]148 bytes (15 words) - 11:52, 19 March 2024
- Board of Directors, [[National Security Network]]; Managing Director, Technology Investment Banking, [[JPMorgan]]149 bytes (15 words) - 22:39, 30 November 2009
- U.S. [[signals intelligence]] and [[communications security]] activity prior to major ground commitments140 bytes (16 words) - 09:49, 24 August 2008
- Government police department responsible for national security in Britain and Commonwealth countries.138 bytes (15 words) - 19:30, 9 September 2009
- Senior Fellow, [[National Security Archive, George Washington University]], specializing in presidential power146 bytes (15 words) - 19:00, 18 November 2009
- ...on Homeland Security and Governmental Affairs|Senate Committee on Homeland Security and Governmental Affairs]], [[Senate Committee on Appropriations]]; [[Senat470 bytes (59 words) - 10:27, 27 June 2023
- {{r|Information security}} {{r|Communications Security Establishment}}1 KB (173 words) - 14:49, 4 April 2024
- ...for Counterterrorism; Director for Middle East and South Asia on National Security Council staff and Deputy Assistant Secretary of State for East Asia Affairs556 bytes (78 words) - 11:43, 6 October 2009
- {{seealso|Intelligence cycle security}} ...will be, or are used. It complements, but does not replace, other forms of security.3 KB (424 words) - 08:11, 4 May 2024
- ...stitution]]; Director of the Center for Peace and Security Studies and the Security Studies Program at [[Georgetown University]] (2003-); Consultant, [[9-11 C550 bytes (73 words) - 09:39, 14 February 2024
- Cabinet officer who heads the [[United States Department of Homeland Security]]; currently [[Janet Napolitano]]147 bytes (17 words) - 11:41, 3 February 2009
- <!-- Text is transcluded from the Organisation for Security and Cooperation in Europe/Definition subpage-->120 bytes (16 words) - 05:09, 3 January 2011
- National Security Adviser to [[John McCain]]; former "Shadow Government" columnist at [[Forei151 bytes (17 words) - 21:55, 13 October 2009
- ...EO, Susan Davis International (public affairs); advisory council, [[Family Security Matters]]144 bytes (16 words) - 18:54, 6 November 2009
- A non-partisan, Washington, D.C. based think tank for national security and investment options.131 bytes (17 words) - 22:15, 10 December 2009
- ...area of responsibility conducting maritime security operations and theater security cooperation efforts.]]551 bytes (79 words) - 00:01, 13 June 2013
- {{r|Security service}} {{r|Committee for State Security}}1,015 bytes (132 words) - 21:11, 25 May 2024
- A [[Caesar cipher]] not used for security, but only to hide [[spoiler]]s in online discussion.130 bytes (19 words) - 00:25, 7 October 2010
- Chairman of the Board, [[National Security Network]]; Managing Director, Stonebridge International, New York Office151 bytes (17 words) - 22:40, 30 November 2009
- An [[asset backed security]] that is available in tranches of stated maturity date and risk category.137 bytes (19 words) - 05:14, 23 February 2010
- Board of Directors, [[National Security Network]]; Co-Managing Member, Provident Group Asset Management LLC143 bytes (16 words) - 22:40, 30 November 2009
- Director, International Security and Defense Policy Center, RAND Corporation; expert panel, [[Iraq Study Gro148 bytes (17 words) - 09:39, 14 February 2024
- Guiding Coalition, [[Project for National Security Reform]], Retired Chairman and CEO, [[Lockheed Martin]] Corporation155 bytes (17 words) - 19:34, 6 October 2009
- ...ors Association. In the NGA, she was involved in establishing the Homeland Security Advisors Council and Public Safety Task Force. ...the first state counterterrorism center and an early state-level homeland security organization. She was involved in both planning and execution of emergency964 bytes (137 words) - 15:26, 25 February 2023
- ...Stone Point Capital]], LLC; Board of advisors, [[Center for a New American Security]]136 bytes (17 words) - 14:37, 28 September 2009
- ...gy firm, with British origins, active worldwide in aerospace, military and security markets156 bytes (18 words) - 13:29, 13 February 2009
- Peer-reviewed national security journal of the [[Center for Contemporary Conflict]], U.S. [[Naval Postgradu155 bytes (18 words) - 15:37, 13 October 2009
- ...IF Hummingbird Foundation; Board of advisors, [[Center for a New American Security]], [[J Street]]145 bytes (18 words) - 17:02, 24 October 2009
- ...Newsweek]] (coauthor of the "Declassified" blog) and [[MSNBC]]; [[national security]] book author164 bytes (18 words) - 16:16, 27 March 2010
- A [[National Security Agency]] link and packet encryption device for two 100 Mbps serial interfac135 bytes (17 words) - 23:56, 9 April 2009
- ...hink tank and interest group, established in 2006, to reform U.S. national security strategy152 bytes (18 words) - 11:47, 19 March 2024
- ...that information be generated by computers or not. It complements computer security, which protects information in computers.650 bytes (95 words) - 16:22, 30 March 2024
- Guiding Coalition, [[Project for National Security Reform]], Vice President and Director, Foreign Policy Studies, [[Brookings176 bytes (19 words) - 19:59, 6 October 2009
- Communications Director, [[National Security Network]]; previous Rep. [[Jane Harman]]’s Press Secretary; production as170 bytes (19 words) - 15:04, 15 April 2024
- {{r|Information security}} {{r|Internet Protocol security architecture}}1 KB (133 words) - 21:04, 11 January 2010
- Grants given to purchase modern multi-role fireboats, to enhance national security118 bytes (14 words) - 11:18, 12 July 2022
- ...us Ranum is a computer security expert. As of mid-2010, he is at [[Tenable Security]].596 bytes (83 words) - 05:48, 8 April 2024
- | [[Department of Homeland Security]] || || [[United States Coast Guard]] (USCG)<ref name=DhsAgencies/> | [[Department of Homeland Security]] || || [[U.S. Customs and Border Protection]] (CBP)<ref name=DhsAgencies/>5 KB (488 words) - 09:37, 26 October 2023
- {{rpl|Canadian Security Intelligence Service}}114 bytes (13 words) - 20:49, 26 September 2013
- {{r|Social Security}} {{r|social security}}929 bytes (150 words) - 15:20, 23 May 2010
- National Security Adviser of Iraq, called an "honest messenger" during the transitional gover179 bytes (22 words) - 16:53, 12 March 2024
- Research Professor, National Security Affairs, [[Strategic Studies Institute]], U.S. Army War College; Expert pan173 bytes (21 words) - 07:05, 21 March 2024
- ...the encrypted material can be read at need by law enforcement or national security agencies.156 bytes (22 words) - 01:30, 22 May 2010
- Board, [[American Security Project]]; [[lieutenant general]], [[U.S. Army]] retired; head of Army Inte146 bytes (17 words) - 15:56, 21 December 2009