Search results

Jump to navigation Jump to search

Page title matches

  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 18:18, 3 March 2022
  • #REDIRECT [[Better than nothing security]]
    42 bytes (5 words) - 09:01, 3 March 2010
  • ...tegory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and
    493 bytes (70 words) - 05:48, 8 April 2024
  • '''Better than nothing security''', or '''BTNS''', is basically [[IPsec]] done without authentication.<ref | title = Better-Than-Nothing Security: An Unauthenticated Mode of IPsec
    3 KB (516 words) - 05:48, 8 April 2024
  • ...and not intended as a rigid standard for every system. The same level of security may be provided in some other way. For example, there is less need for pas 3) required to install all security updates promptly.<br />
    15 KB (2,320 words) - 18:53, 26 December 2010
  • 160 bytes (21 words) - 09:24, 2 March 2010
  • The '''Security Service''', also known historically if incorrectly as '''MI5''', is the ci
    314 bytes (44 words) - 08:11, 4 May 2024
  • #REDIRECT [[Domain Name System security]]
    41 bytes (5 words) - 08:26, 3 October 2008
  • ...is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou ==The Security Process==
    13 KB (2,000 words) - 16:21, 30 March 2024
  • ...that information be generated by computers or not. It complements computer security, which protects information in computers.
    650 bytes (95 words) - 16:22, 30 March 2024
  • #REDIRECT [[Authentication (information security)#Security token]]
    66 bytes (6 words) - 16:13, 6 May 2010
  • #REDIRECT [[Security Service]]
    30 bytes (3 words) - 19:51, 5 June 2008
  • <!-- Text is transcluded from the Security (finance)/Definition subpage-->
    87 bytes (11 words) - 08:36, 22 February 2010
  • '''Social security''' is a generic term, most commonly used in the USA and UK, referring to di ...Altmeyer]], The Formative Years of Social Security: A Chronicle of Social Security Legislation and Administration, 1934-1954." Madison: University of Wisconsi
    2 KB (269 words) - 19:21, 8 June 2010
  • #REDIRECT [[Social security]]
    29 bytes (3 words) - 17:07, 27 September 2007
  • '''National security''', in the most objective usage, describing the totality of necessary funct ...ns aware of the context, such as the nondescript name of the U.S. National Security Agency.
    784 bytes (127 words) - 16:45, 25 March 2024
  • #Redirect [[Information security]]
    34 bytes (3 words) - 20:16, 24 October 2008
  • ...heft or corruption, or the preservation of availability, as defined in the security policy. [[Information assurance]] discusses a related topic - how "sure" so ...ive requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (267 words) - 05:49, 8 April 2024
  • 62 bytes (6 words) - 08:38, 13 April 2010
  • 188 bytes (28 words) - 10:54, 27 February 2010
  • '''Regional security''', in [[international relations]], that focuses on less than global soluti
    1 KB (151 words) - 23:14, 17 September 2010
  • {{seealso|Intelligence cycle security}} ...will be, or are used. It complements, but does not replace, other forms of security.
    3 KB (424 words) - 08:11, 4 May 2024
  • <!-- Text is transcluded from the Collective security/Definition subpage-->
    88 bytes (11 words) - 10:44, 17 June 2011
  • 81 bytes (10 words) - 11:27, 13 December 2009
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:22, 16 February 2009
  • '''Family Security Matters''' is the name of an American educational interest group that has t ...nd to empower all Americans to become proactive defenders of our national security and community safety."<ref>{{citation
    1 KB (150 words) - 13:52, 6 April 2024
  • 348 bytes (49 words) - 19:47, 7 March 2024
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:23, 16 February 2009
  • Brief description of email security problems and solutions.
    95 bytes (11 words) - 19:08, 23 September 2009
  • 12 bytes (1 word) - 16:59, 8 May 2008
  • === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).
    1 KB (200 words) - 17:37, 9 October 2009
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 11:58, 14 July 2022
  • 238 bytes (34 words) - 13:42, 6 April 2024
  • 107 bytes (10 words) - 08:11, 4 May 2024
  • 12 bytes (1 word) - 17:01, 8 May 2008
  • ...at generates a device-specific, time-variant [[authentication (information security)|authentication code]], to be validated by an authentication server in comb
    263 bytes (37 words) - 11:15, 7 May 2010
  • ...and unauthorized information access. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which i :*[[ #Physical security | Physical security]]
    33 KB (4,816 words) - 08:11, 4 May 2024
  • <!-- Text is transcluded from the Asset backed security/Definition subpage-->
    90 bytes (12 words) - 05:08, 23 February 2010
  • 81 bytes (10 words) - 09:47, 31 July 2010
  • '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • 12 bytes (1 word) - 18:07, 14 November 2007
  • #REDIRECT [[Information security]]
    34 bytes (3 words) - 23:06, 21 April 2010
  • ...f Homeland Security|Department of Homeland Security]] has provided '''Port Security Grants''' to ports within the [[United States of America]], to build [[fire The grants are made under the [[Maritime Transportation Security Act of 2002]].<ref name=PortSecurity2015/> The [[Federal Emergency Manageme
    9 KB (1,108 words) - 08:34, 6 March 2024
  • ...is not a [[United States cabinet|Cabinet]] position. Because the National Security Advisor has a close relationship with the President they can and do direct ...sidency of [[Richard Nixon]] it was generally recognized that his National Security Advisor, [[Henry Kissinger]] was more important than his [[Secretary of Sta
    3 KB (300 words) - 16:16, 5 January 2024
  • ...and strategic focus to the [[American progressivism|progressive]] national security community." It convenes expert groups to create what it considers ideologic | publisher = National Security Network}}</ref>
    8 KB (1,219 words) - 08:41, 4 May 2024
  • ...l staff. With the exception of the Assistant to the President for National Security Affairs, all other NSC members would be either elected officials, or appoin ...Office of the President. With the formation of the Department of Homeland Security, FEMA was absorbed and lost its effective cabinet status.
    3 KB (374 words) - 16:22, 30 March 2024
  • ...ssible to take a somewhat more manageable view by focusing on contemporary security aspects. The situation is one of [[asymmetrical warfare]]: [[Palestine|Pale
    3 KB (448 words) - 02:59, 21 February 2010
  • 157 bytes (20 words) - 13:54, 6 July 2008
  • 31 bytes (4 words) - 06:50, 11 March 2024
  • In [[information security]], the processes of [[identification, authentication and credentialing]] ar *Something you '''have''' (e.g., a [[key (lock)]], [[security token]] or credit card)
    2 KB (292 words) - 14:55, 20 May 2010

Page text matches

  • ...controls such as physical security and personnel [[classified information|security clearances]]
    234 bytes (24 words) - 14:55, 26 February 2010
  • *[[Family Security Matters]] head [[Carol Taber]] on "Debunking the Security Mom", http://www.realclearpolitics.com/articles/2006/10/debunking_the_debun
    204 bytes (25 words) - 00:55, 4 October 2009
  • ...tion (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]
    299 bytes (36 words) - 11:15, 6 May 2010
  • #REDIRECT [[Authentication (information security)#Security token]]
    66 bytes (6 words) - 16:13, 6 May 2010
  • [[Information security]] strategies and technologies that continue to ensure security without depending on physical or organizational perimeters
    180 bytes (20 words) - 13:01, 16 March 2010
  • {{r|Communications Security Establishment}} {{r|Information security}}
    379 bytes (41 words) - 18:24, 31 January 2009
  • {{r|Security policy}} {{r|Communications security}}
    356 bytes (42 words) - 10:42, 3 September 2008
  • Israel's domestic security organization, comparable to the British [[Security Service]]
    123 bytes (13 words) - 16:08, 1 September 2009
  • ...d is known as "[[Edwin E. Witte/Debate Guide#Father|the 'Father' of Social Security]]."
    267 bytes (38 words) - 17:21, 13 September 2020
  • ...r]]/security researcher at [[Cambridge University|Cambridge]], author of ''Security Engineering'', a standard textbook.
    169 bytes (17 words) - 14:05, 22 May 2011
  • ...Security Studies]]; Director, [[George Washington University]] [[National Security Archive]]
    164 bytes (17 words) - 03:35, 31 August 2009
  • ...rofit, nonpartisan think tank devoted to enhancing international peace and security. Its major objectives are: * strengthening institutions for international peace and security
    361 bytes (47 words) - 04:39, 5 April 2024
  • ...nnel and physical security. Information assurance is meaningless without a security policy defining threats, management approach to protection, staff responsib Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules, for the a
    2 KB (232 words) - 16:21, 30 March 2024
  • ...mass destruction, conventional weapons proliferation, peace operations and security alliances.
    361 bytes (44 words) - 11:20, 15 September 2009
  • ...rm known for reporting serious security lapses in the the [[South Korean]] security app [[Smart Sheriff]]
    172 bytes (21 words) - 00:49, 5 January 2024
  • ...ity Studies]]; Director of the [[George Washington University]] [[National Security Archive]]
    170 bytes (19 words) - 03:30, 31 August 2009
  • {{r|Organs of State Security}} {{r|Committee for State Security||**}}
    328 bytes (42 words) - 08:11, 4 May 2024
  • ...a [[security (finance)|security]] by its issuer, (ii) the purchase of a [[security]] that had been [[selling short|sold short]].
    239 bytes (34 words) - 05:25, 4 December 2012
  • ...ard]], [[United States Department of State]]; academic adviser, Center for Security Policy
    207 bytes (23 words) - 13:52, 6 April 2024
  • {{r|Information security}} {{r|Security token}}
    558 bytes (60 words) - 10:08, 4 May 2022
  • ...tions security (COMSEC) equipment under the control of the U.S. [[National Security Agency]] (NSA)
    183 bytes (23 words) - 13:03, 23 March 2009
  • ...Economic and Strategic Studies]]; Advisor, [[Jewish Institute for National Security Affairs]]
    400 bytes (49 words) - 19:46, 17 July 2009
  • '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • ...ited Nations Security Council]] has passed close to 2000 '''United Nations Security Council resolutions'''. | [[United Nations Security Council Resolution 1267|1267]] ||
    623 bytes (72 words) - 07:29, 9 September 2011
  • ...[[National Security Network]]; Guiding Coalition, [[Project for National Security Reform]]; Democratic presidential candidate; General, [[United States Army]
    449 bytes (53 words) - 11:52, 19 March 2024
  • ...p, Atlantic Council; President and CEO, [[Business Executives for National Security]]
    206 bytes (23 words) - 11:52, 19 March 2024
  • ...cense]]; Director, Center for Security Policy; board of trustees, [[Family Security Matters]]
    184 bytes (24 words) - 13:52, 6 April 2024
  • {{r|Security}} ===Transmission security===
    697 bytes (85 words) - 11:30, 27 February 2010
  • *Shaping the Iraq Inheritance, [[Center for a New American Security]] ...on: A Responsible Way Forward and Out of Iraq, [[Center for a New American Security]]
    406 bytes (58 words) - 17:26, 22 September 2009
  • ...f Information Security for [[Italy|Italian]] intelligence, responsible for security clearances and serving as the secretariat for the [[CISR]]
    190 bytes (23 words) - 19:49, 4 July 2009
  • ...tre on Global Health Security; formerly Assistant Director-General, Health Security and Environment, [[World Health Organization]]
    203 bytes (23 words) - 14:58, 11 September 2009
  • ...irs 1995-1996; study group for the [[Hart-Rudman Commission]] on national security requirements, 1998-2001
    431 bytes (50 words) - 20:46, 22 August 2009
  • ...] (1998-2002). NSC Senior Director for Combating Terrorism at the National Security Council (2002-3)
    558 bytes (65 words) - 04:34, 21 March 2024
  • '''Family Security Matters''' is the name of an American educational interest group that has t ...nd to empower all Americans to become proactive defenders of our national security and community safety."<ref>{{citation
    1 KB (150 words) - 13:52, 6 April 2024
  • ==Social Security Administration== ...tory/collectalt.html Social Security History: Arthur J. Altmeyer]," Social Security Administration.
    1 KB (134 words) - 18:38, 8 June 2010
  • ...xecutive Director of the Security Studies Program and Center for Peace and Security Studies
    431 bytes (55 words) - 14:30, 22 December 2009
  • ...ith this transfer, it must be done over. Also, the simple case provides no security either for access to the computers or to the file information as it moves t ==Security==
    905 bytes (126 words) - 11:04, 11 July 2010
  • ...ies, Chinese foreign policy, strategic culture, statecraft, and East Asian security in theory and practice; formerA djunct Assistant Professor and Instructor i
    460 bytes (56 words) - 15:36, 13 October 2009
  • ...ity Studies]]; Partner at James & Hoffman and litigator for the [[National Security Archive, George Washington University]]
    204 bytes (26 words) - 18:33, 18 November 2009
  • ...and Homeland Defense, [[National Security Council]]; Professor of National Security Studies and Director/Founder of the Center for Counterproliferation Researc
    647 bytes (77 words) - 15:47, 14 September 2009
  • *[http://www.un.org/Docs/sc/ UN Security Council] — official site **[http://www.un.org/Docs/sc/unsc_background.html UN Security Council – Background]
    1 KB (207 words) - 07:38, 12 February 2009
  • The position of having sold a borrowed [[security (finance)|security]] or [[derivative]] (usually with the intention of buying it back and retur
    223 bytes (34 words) - 04:56, 4 December 2012
  • ...[[colonel]], retired, [[United States Marine Corps]]; adviser, Center for Security Policy; Institute Fellow, [[Claremont Institute]]
    426 bytes (56 words) - 13:52, 6 April 2024
  • ...ormer Senior Fellow, [[Brookings Institution]]; Bush-Cheney 2004 campaign; security analyst, CNN
    537 bytes (59 words) - 08:40, 4 May 2024
  • ==<div id="Father"></div>Who was "The 'Father' of Social Security?"== ...d "this title less than many others." Witte pointed out that the [[Social Security Act]] was a collaborative undertaking:
    2 KB (240 words) - 19:47, 31 May 2010
  • {{r|Computer security||**}} {{r|Communications security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • ...Center for Security Policy; Vice Chairman, [[Jewish Institute for National Security Affairs]] (JINSA); advisor, [[U.S. Committee for a Free Lebanon]]
    244 bytes (32 words) - 13:52, 6 April 2024
  • ...ng Coalition, [[Project for National Security Reform]]; board, [[American Security Project]]; Senior Vice President for International Affairs, [[U.S. Chamber
    301 bytes (35 words) - 11:52, 19 March 2024
  • ...]], [[national security]] and counterterrorism law); contributor, [[Family Security Matters]], Fox News, [[National Review]], [[Washington Examiner]], Townhall
    344 bytes (37 words) - 08:41, 4 May 2024
  • The primary high-security [[cryptography|cryptographic]] [[communications security]] machine of [[Nazi Germany]]. Unknown to the Germans, it had been substant
    321 bytes (39 words) - 10:20, 14 June 2010
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)