Search results
Jump to navigation
Jump to search
Page title matches
- ...ation. There is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou13 KB (2,000 words) - 16:21, 30 March 2024
- #Redirect [[Information security]]34 bytes (3 words) - 20:16, 24 October 2008
- 31 bytes (4 words) - 05:36, 15 March 2024
- 319 bytes (41 words) - 08:45, 13 September 2009
- In [[information security]], the processes of [[identification, authentication and credentialing]] ar2 KB (292 words) - 14:55, 20 May 2010
- 686 bytes (86 words) - 21:24, 30 November 2013
- ...firm one's [[identification (information security)|identification]] to a [[information security|secure information system]]162 bytes (18 words) - 11:12, 6 May 2010
- ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]299 bytes (36 words) - 11:15, 6 May 2010
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- {{r|Information security}} {{r|Identification (information security)}}368 bytes (39 words) - 05:38, 15 March 2024
- {{r|Information security}} {{r|RADIUS (information security)}}558 bytes (60 words) - 10:08, 4 May 2022
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:52, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002/Definition]]76 bytes (8 words) - 08:52, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002/Related Articles]]82 bytes (9 words) - 08:52, 13 September 2009
- ...(FISMA), was passed to support the [[E-Government Act of 2002]]. Without [[information security]], it is impossible for government to deliver reliable services through ele ##ISO 27000 series information security management standards20 KB (2,779 words) - 13:29, 20 March 2023
- 185 bytes (24 words) - 08:52, 13 September 2009
- 2 KB (178 words) - 11:59, 20 September 2009
- {{r|Information security}}428 bytes (56 words) - 08:52, 13 September 2009
Page text matches
- ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]299 bytes (36 words) - 11:15, 6 May 2010
- 234 bytes (24 words) - 14:55, 26 February 2010
- ...firm one's [[identification (information security)|identification]] to a [[information security|secure information system]]162 bytes (18 words) - 11:12, 6 May 2010
- {{r|Information security}} {{r|RADIUS (information security)}}558 bytes (60 words) - 10:08, 4 May 2022
- #REDIRECT [[Authentication (information security)#Security token]]66 bytes (6 words) - 16:13, 6 May 2010
- [[Information security]] strategies and technologies that continue to ensure security without depe180 bytes (20 words) - 13:01, 16 March 2010
- Describes the manufacture and sale of information security products which instill in the consumer a false sense of security, because i237 bytes (35 words) - 14:55, 25 October 2008
- {{r|Information security}} {{r|Identification (information security)}}368 bytes (39 words) - 05:38, 15 March 2024
- '''Information assurance''', or sometimes '''information security''', is a broad term that includes both communications security and computer Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules, for the a2 KB (232 words) - 16:21, 30 March 2024
- '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.149 bytes (20 words) - 11:59, 22 June 2008
- Department of Information Security for [[Italy|Italian]] intelligence, responsible for security clearances and190 bytes (23 words) - 19:49, 4 July 2009
- {{r|Information security}}379 bytes (41 words) - 18:24, 31 January 2009
- In [[information security]], the assurance that data retrieved from an information system has the sam169 bytes (24 words) - 15:24, 30 September 2009
- {{r|Information security}}356 bytes (42 words) - 10:42, 3 September 2008
- #Redirect [[Information security]]34 bytes (3 words) - 20:16, 24 October 2008
- #REDIRECT [[Information security]]34 bytes (3 words) - 23:06, 21 April 2010
- {{r|Information security||**}}558 bytes (70 words) - 14:29, 26 February 2010
- {{r|Information security}} {{r|RADIUS (information security)}}231 bytes (29 words) - 13:28, 1 February 2009
- '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s. The objective of computer security varies a2 KB (267 words) - 05:49, 8 April 2024
- {{r|Information security}} {{r|Federal Information Security Management Act}}342 bytes (47 words) - 14:35, 30 September 2009
- {{r|Information Security}}1 KB (161 words) - 08:37, 4 May 2024
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:52, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- #REDIRECT [[Federal Information Security Management Act of 2002]]65 bytes (7 words) - 08:55, 13 September 2009
- [[Signals intelligence]] and [[information security]] organization of [[Australia]]119 bytes (11 words) - 21:20, 22 May 2010
- #REDIRECT [[Federal Information Security Management Act of 2002/Definition]]76 bytes (8 words) - 08:52, 13 September 2009
- {{r|Information security}}364 bytes (43 words) - 05:34, 15 March 2024
- #REDIRECT [[Federal Information Security Management Act of 2002/Related Articles]]82 bytes (9 words) - 08:52, 13 September 2009
- ...ce, such as a serial or [[USB]] port, which serves as an [[authentication (information security)|authenticator]] requiring no human involvement once connected; contains un387 bytes (53 words) - 11:23, 7 May 2010
- [[Australia]]'s organization responsible for [[signals intelligence]] and [[information security]]134 bytes (13 words) - 16:17, 22 December 2008
- {{r|Information security}}257 bytes (31 words) - 20:11, 22 February 2009
- ...tion, in the government of [[New Zealand]], which has responsibility for [[information security]] and [[signals intelligence]]174 bytes (20 words) - 16:16, 22 December 2008
- A block cipher developed by the Korean Information Security Agency, used broadly throughout South Korean industry, but seldom found els179 bytes (23 words) - 06:59, 1 October 2009
- ...the alignment of a system's function and user expectation with respect to information security.159 bytes (21 words) - 12:05, 11 July 2010
- {{r|Information security}}220 bytes (27 words) - 02:40, 4 March 2010
- '''Confidentiality''', with respect to [[information security]], is the assurance that it will not be disclosed to unauthorized individua725 bytes (96 words) - 13:27, 30 September 2009
- ...The Dipartimento delle Informazioni per la Sicurezza (DIS, "Department of Information Security"), is the secretariat for the CISR, but also is the custodian of informati1 KB (168 words) - 07:29, 18 March 2024
- {{r|Information security}}322 bytes (42 words) - 20:55, 11 April 2009
- {{r|Information security}}1 KB (173 words) - 14:49, 4 April 2024
- In [[information security]], the processes of [[identification, authentication and credentialing]] ar2 KB (292 words) - 14:55, 20 May 2010
- {{r|Information security}}2 KB (194 words) - 14:48, 4 April 2024
- In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that may or may not reside in a single physical computer. Large *A substitute for information security administration1 KB (190 words) - 05:48, 8 April 2024
- {{r|Information security}}814 bytes (105 words) - 18:35, 11 January 2010
- {{r|Federal Information Security Management Act of 2002}}1 KB (142 words) - 11:26, 6 February 2011
- '''Integrity''', in [[information security]], refers to the assurance that data retrieved from an information system h844 bytes (119 words) - 15:23, 30 September 2009
- A [[communications intelligence]] and [[information security]] organization in Russia, which became independent of the [[KGB]] at the en242 bytes (34 words) - 21:21, 22 May 2010
- {{r|Information security}}428 bytes (56 words) - 08:52, 13 September 2009
- ...ntral Security Service''', who has authority over the military services' [[information security]] and [[signals intelligence]] units. ...then two principal chiefs, one for signals intelligence and the other for information security.2 KB (249 words) - 05:48, 8 April 2024
- {{rpl|Information security||**}}437 bytes (60 words) - 07:12, 5 March 2010
- {{r|Information security}}678 bytes (84 words) - 15:58, 11 January 2010
- {{r|Information security}}1 KB (133 words) - 21:04, 11 January 2010
- ...m for information security#source authentication|source authentication and information security#integrity|data integrity protection; during a conversation, both players ar1 KB (174 words) - 07:34, 18 March 2024
- ...ed device that generates a device-specific, time-variant [[authentication (information security)|authentication code]], to be validated by an authentication server in comb263 bytes (37 words) - 11:15, 7 May 2010
- ...F)''' is a area with extremely high standards of physical, electronic, and information security, such that it meets the criteria for [[classified information]] subject to4 KB (639 words) - 05:49, 8 April 2024
- 2 KB (319 words) - 21:41, 25 June 2010
- {{r|Information security}}689 bytes (85 words) - 14:31, 22 March 2024
- {{r|Information security}}263 bytes (30 words) - 02:42, 30 November 2008
- '''Availability''' of an information service, in the context of [[information security]] means that authorized users can depend on being able to use it whenever i868 bytes (139 words) - 16:34, 10 June 2010
- ...fic background for a broad range of activities in signals intelligence and information security.848 bytes (113 words) - 16:46, 25 March 2024
- {{r|Information security}}248 bytes (31 words) - 12:03, 28 December 2010
- {{r|Information security}}200 bytes (24 words) - 17:14, 22 February 2009
- {{r|Information security}}1 KB (163 words) - 02:30, 3 February 2010
- {{r|Information security}}211 bytes (24 words) - 15:26, 30 September 2009
- {{r|Information security}}352 bytes (42 words) - 14:59, 20 March 2024
- {{r|Information security}}133 bytes (14 words) - 18:50, 7 February 2009
- * ''Principles of Information Security, Second Edition'', book by Whitman, M. & Mattord, H., 2005, published by Th506 bytes (74 words) - 16:53, 9 December 2008
- {{r|Information security}}455 bytes (56 words) - 10:13, 7 February 2009
- '''SEED''' is a [[block cipher]] developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea. It is a 16-round [[Feistel cipher435 bytes (67 words) - 05:48, 8 April 2024
- 3 KB (516 words) - 07:30, 18 March 2024
- 3 KB (451 words) - 18:36, 18 April 2010
- ...oviding [[information security#integrity|data integrity protection]] and [[information security#source authentication|source authentication]]. The term '''HMAC''' is often2 KB (313 words) - 05:49, 8 April 2024
- {{r|Information security}}640 bytes (81 words) - 04:17, 27 April 2010
- {{r|Information security}}578 bytes (75 words) - 02:21, 24 September 2013
- {{r|Information security}}568 bytes (71 words) - 20:51, 11 January 2010
- {{r|Information security}}595 bytes (75 words) - 08:52, 22 April 2024
- ...egal means such as [[Non-Disclosure Agreement]]s, [[classified information|information security classification]] (e.g., SECRET), and contract stipulation can provide legal6 KB (850 words) - 09:34, 7 February 2011
- {{r|Information security}}663 bytes (98 words) - 14:56, 11 July 2010
- ...l system#special access program|Special Access Program (SAP)]], but not an information security program as is typical for SAPs, the PRP complements the security clearance3 KB (426 words) - 03:45, 25 March 2024
- {{r|Information security}}1 KB (133 words) - 09:08, 19 April 2024
- {{r|Information security}}854 bytes (123 words) - 01:07, 2 November 2008
- '''Digital signatures''' provide [[information security#source authentication|source authentication]] for online documents, message2 KB (277 words) - 05:48, 8 April 2024
- {{r|Information security}}1 KB (140 words) - 11:18, 11 January 2010
- [[Information security]] doctrine demands that while SCADA may be sent by IP, if it involves [[cri2 KB (324 words) - 16:37, 22 August 2009
- 8 KB (1,196 words) - 16:22, 30 March 2024
- {{r|Information security}}1 KB (185 words) - 21:09, 22 September 2010
- {{r|Federal Information Security Management Act of 2002}}1 KB (177 words) - 12:27, 5 April 2024
- {{r|Information security}}2 KB (308 words) - 09:08, 19 April 2024
- ...cess, and has testified before Congress and executive agencies such as the Information Security Oversight Office. Aftergood is a member of the advisory board of the Elect5 KB (765 words) - 07:36, 18 March 2024
- ...the RSA system which has since grown into one of the major players in the information security industry.1 KB (195 words) - 07:35, 18 March 2024
- ...ww1.va.gov/vapubs/viewPublication.asp?Pub_ID=50&FType=2 VA Directive 6500 (Information Security Program)]4 KB (517 words) - 14:34, 2 February 2023
- ...used to encrypt the message. Thus, the [[public key]] techniques provide [[information security#source authentication|source authentication]] and [[key management]] servic3 KB (544 words) - 05:49, 8 April 2024
- ...nt is better, and GLBA requires that financial institutions have a written information security plan, which not only covers the personal financial data of customers, but f6 KB (877 words) - 16:10, 22 June 2010
- ...(FISMA), was passed to support the [[E-Government Act of 2002]]. Without [[information security]], it is impossible for government to deliver reliable services through ele ##ISO 27000 series information security management standards20 KB (2,779 words) - 13:29, 20 March 2023
- *[[Public key]] techniques are often used for [[information security#source authentication|source authentication]], to authenticate people or de ...e often authenticated with a [[hashed message authentication code]], for [[information security#integrity|data integrity protection]]. This prevents [[rewrite attack]]s, a6 KB (903 words) - 05:49, 8 April 2024
- * [[SEED (cipher)|SEED]], developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea.4 KB (551 words) - 12:36, 13 April 2016
- [[Information security#source authentication|authentication]] and [[information security#integrity|integrity]] checks allow unauthorized control or data manipulatio10 KB (1,453 words) - 05:49, 8 April 2024
- ...ation. There is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou13 KB (2,000 words) - 16:21, 30 March 2024
- ...rted a company, [[RSA Laboratories]], which became a major player in the [[information security]] industry. [[Ron Rivest | Rivest]] in particular went on to invent additio7 KB (1,171 words) - 05:48, 8 April 2024
- A '''challenge-response protocol''' is a technique for managing [[information security#source authentication|source authentication]].2 KB (382 words) - 05:49, 8 April 2024
- Like any encryption scheme, an OE system must rely on some form of [[information security#source authentication|source authentication]]; it does no good at all to en14 KB (2,265 words) - 05:49, 8 April 2024
- {{r|Federal Information Security Management Act of 2002}}5 KB (656 words) - 09:03, 9 August 2023
- | title = Principles of Information Security, Second Edition25 KB (3,794 words) - 05:48, 8 April 2024
- ...rum of the American Bar Association Section of Antitrust Law's Privacy and Information Security Committee5 KB (692 words) - 23:38, 29 September 2020
- Sometimes called a SAP, but not an information security program as such, is the Personnel Reliability Program (PRP). All personnel24 KB (3,594 words) - 05:16, 31 March 2024
- ...ormation security | information]], [[#personnel security | personnel]], [[#information security | computer]], [[#counter-SIGINT | signals, communications, and electronic33 KB (4,816 words) - 08:11, 4 May 2024
- ...he site also strictly follows requirements of the Privacy Act, the Federal Information Security Management Act, and other privacy and security requirements.16 KB (2,514 words) - 09:25, 10 February 2023
- * Chief Information Security Officer19 KB (2,853 words) - 09:20, 22 April 2024
- '''Steganography''' is an area of information security where the primary goal is to hide a secret message within a carrier. The ca11 KB (1,766 words) - 09:26, 31 October 2015
- ...exploitation threat, and Communications-Electronics works out the detailed Information Security (INFOSEC) and Communications Security (COMSEC) doctrine, in compliance with29 KB (4,252 words) - 07:36, 18 March 2024
- ...als with [[financial system|finance]], it has significant involvement in [[information security]]. ...ve come from trusted employees who should not have been trusted, classic [[information security]] requirements come into play:15 KB (2,227 words) - 09:57, 24 November 2009
- ...of such attacks and defenses against them are beyond our scope here; see [[information security]]. ...ms can be designed to enforce some of these procedures. For details, see [[information security]].32 KB (4,913 words) - 14:38, 18 March 2024
- ...of such attacks and defenses against them are beyond our scope here; see [[information security]]. ...ms can be designed to enforce some of these procedures. For details, see [[information security]].32 KB (4,916 words) - 05:49, 8 April 2024
- ...[[information security#source authentication|source authentication]], or [[information security#integrity|data integrity protection]]. One-way hashes are commonly used to ...technique is used in many security systems, such as [[IPsec]], to ensure [[information security#integrity|data integrity]].16 KB (2,641 words) - 15:51, 8 April 2024
- ...tion]], [[information security#content integrity|content integrity]] and [[information security#content confidentiality|content confidentiality]], at the IP ([[Internet Pr ''IPsec cannot be secure if the system isn't.'' [[Information security]] on IPsec gateway machines is an essential requirement if IPsec is to func40 KB (6,219 words) - 05:49, 8 April 2024
- *More research on information security15 KB (2,287 words) - 15:14, 29 March 2024
- * [[Credentialing (information security)/Definition]] * [[Information security/Definition]]28 KB (2,875 words) - 16:19, 7 April 2024
- * [[Credentialing (information security)/Related Articles]] * [[Information security/Related Articles]]36 KB (4,044 words) - 16:22, 7 April 2024
- * [[Template:Credentialing (information security)/Metadata]] * [[Template:Information security/Metadata]]39 KB (4,231 words) - 05:22, 8 April 2024
- * ISO/IEC TR 17799:2000 Code of Practice for Information Security Management14 KB (2,020 words) - 07:32, 20 April 2024
- 9 KB (1,384 words) - 03:56, 13 September 2009
- ...domain of cryptography. See [[Information_security#Information_transfer | information security]] for the different types of authentication, and [[#Cryptographic_hash_algo ...'just'' a branch of mathematics. It might also be considered a branch of [[information security]] or of [[engineering]].52 KB (8,332 words) - 05:49, 8 April 2024
- Security, which the [[Federal Information Security Management Act of 2002]] defines as includeing [[availability]], [[confiden57 KB (8,399 words) - 17:39, 13 March 2024
- ...re. See [[hybrid cryptosystem]] for how the components fit together, and [[information security]] for broader issues. * [[SEED (cipher)|SEED]], developed by the [[Korean Information Security Agency]] (KISA) and widely used in Korea.53 KB (8,371 words) - 05:48, 8 April 2024