Search results

Jump to navigation Jump to search

Page title matches

  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 18:18, 3 March 2022
  • '''Better than nothing security''', or '''BTNS''', is basically [[IPsec]] done without authentication.<ref | title = Better-Than-Nothing Security: An Unauthenticated Mode of IPsec
    3 KB (516 words) - 05:48, 8 April 2024
  • #REDIRECT [[Better than nothing security]]
    42 bytes (5 words) - 09:01, 3 March 2010
  • ...tegory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and
    493 bytes (70 words) - 05:48, 8 April 2024
  • 188 bytes (28 words) - 10:54, 27 February 2010
  • '''Regional security''', in [[international relations]], that focuses on less than global soluti
    1 KB (151 words) - 23:14, 17 September 2010
  • The '''Security Service''', also known historically if incorrectly as '''MI5''', is the ci
    318 bytes (44 words) - 16:36, 8 August 2010
  • #REDIRECT [[Domain Name System security]]
    41 bytes (5 words) - 08:26, 3 October 2008
  • ...is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou ==The Security Process==
    13 KB (2,000 words) - 16:21, 30 March 2024
  • <!-- Text is transcluded from the Collective security/Definition subpage-->
    88 bytes (11 words) - 10:44, 17 June 2011
  • ...that information be generated by computers or not. It complements computer security, which protects information in computers.
    650 bytes (95 words) - 16:22, 30 March 2024
  • #REDIRECT [[Security Service]]
    30 bytes (3 words) - 19:51, 5 June 2008
  • '''Social security''' is a generic term, most commonly used in the USA and UK, referring to di ...Altmeyer]], The Formative Years of Social Security: A Chronicle of Social Security Legislation and Administration, 1934-1954." Madison: University of Wisconsi
    2 KB (269 words) - 19:21, 8 June 2010
  • #REDIRECT [[Social security]]
    29 bytes (3 words) - 17:07, 27 September 2007
  • '''National security''', in the most objective usage, describing the totality of necessary funct ...ns aware of the context, such as the nondescript name of the U.S. National Security Agency.
    784 bytes (127 words) - 16:45, 25 March 2024
  • ...and not intended as a rigid standard for every system. The same level of security may be provided in some other way. For example, there is less need for pas 3) required to install all security updates promptly.<br />
    15 KB (2,320 words) - 18:53, 26 December 2010
  • 160 bytes (21 words) - 09:24, 2 March 2010
  • #Redirect [[Information security]]
    34 bytes (3 words) - 20:16, 24 October 2008
  • ...heft or corruption, or the preservation of availability, as defined in the security policy. [[Information assurance]] discusses a related topic - how "sure" so ...ive requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (267 words) - 05:49, 8 April 2024
  • #REDIRECT [[Authentication (information security)#Security token]]
    66 bytes (6 words) - 16:13, 6 May 2010

Page text matches

  • ...controls such as physical security and personnel [[classified information|security clearances]]
    234 bytes (24 words) - 14:55, 26 February 2010
  • *[[Family Security Matters]] head [[Carol Taber]] on "Debunking the Security Mom", http://www.realclearpolitics.com/articles/2006/10/debunking_the_debun
    204 bytes (25 words) - 00:55, 4 October 2009
  • ...tion (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]
    299 bytes (36 words) - 11:15, 6 May 2010
  • #REDIRECT [[Authentication (information security)#Security token]]
    66 bytes (6 words) - 16:13, 6 May 2010
  • [[Information security]] strategies and technologies that continue to ensure security without depending on physical or organizational perimeters
    180 bytes (20 words) - 13:01, 16 March 2010
  • {{r|Communications Security Establishment}} {{r|Information security}}
    379 bytes (41 words) - 18:24, 31 January 2009
  • {{r|Security policy}} {{r|Communications security}}
    356 bytes (42 words) - 10:42, 3 September 2008
  • Israel's domestic security organization, comparable to the British [[Security Service]]
    123 bytes (13 words) - 16:08, 1 September 2009
  • ...d is known as "[[Edwin E. Witte/Debate Guide#Father|the 'Father' of Social Security]]."
    267 bytes (38 words) - 17:21, 13 September 2020
  • ...r]]/security researcher at [[Cambridge University|Cambridge]], author of ''Security Engineering'', a standard textbook.
    169 bytes (17 words) - 14:05, 22 May 2011
  • ...Security Studies]]; Director, [[George Washington University]] [[National Security Archive]]
    164 bytes (17 words) - 03:35, 31 August 2009
  • ...rofit, nonpartisan think tank devoted to enhancing international peace and security. Its major objectives are: * strengthening institutions for international peace and security
    361 bytes (47 words) - 04:39, 5 April 2024
  • ...nnel and physical security. Information assurance is meaningless without a security policy defining threats, management approach to protection, staff responsib Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules, for the a
    2 KB (232 words) - 16:21, 30 March 2024
  • ...mass destruction, conventional weapons proliferation, peace operations and security alliances.
    361 bytes (44 words) - 11:20, 15 September 2009
  • ...rm known for reporting serious security lapses in the the [[South Korean]] security app [[Smart Sheriff]]
    172 bytes (21 words) - 00:49, 5 January 2024
  • ...ity Studies]]; Director of the [[George Washington University]] [[National Security Archive]]
    170 bytes (19 words) - 03:30, 31 August 2009
  • {{r|Organs of State Security}} {{r|Committee for State Security||**}}
    353 bytes (44 words) - 14:31, 22 March 2024
  • ...a [[security (finance)|security]] by its issuer, (ii) the purchase of a [[security]] that had been [[selling short|sold short]].
    239 bytes (34 words) - 05:25, 4 December 2012
  • ...ard]], [[United States Department of State]]; academic adviser, Center for Security Policy
    207 bytes (23 words) - 13:52, 6 April 2024
  • {{r|Information security}} {{r|Security token}}
    558 bytes (60 words) - 10:08, 4 May 2022
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)