Information assurance/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Cryptography}} {{r|Security policy}} ==Subtopics== {{r|Communications security}} {{r|Extranet}} {{r|Information security}} {{r|Internet Protocol secur...) |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 7: | Line 7: | ||
==Subtopics== | ==Subtopics== | ||
{{r|Communications security}} | {{r|Communications security}} | ||
{{r|Information security}} | {{r|Information security}} | ||
{{r|Internet Protocol security architecture}} | {{r|Internet Protocol security architecture}} | ||
Line 17: | Line 17: | ||
{{r|Risk analysis}} | {{r|Risk analysis}} | ||
{{r|Virtual private network}} | {{r|Virtual private network}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Broadcast journalism}} | |||
{{r|JTRS}} | |||
{{r|Database}} | |||
{{r|PATRIOT Act Section 816}} | |||
{{r|Computer networking session protocols}} |
Latest revision as of 06:01, 1 September 2024
- See also changes related to Information assurance, or pages that link to Information assurance or to this page or whose text contains "Information assurance".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Security policy [r]: Add brief definition or description
Subtopics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Internet Protocol security architecture [r]: Add brief definition or description
- Intranet [r]: A set of networked computers, under one administration, which can only communicate with one another. [e]
- Secure Sockets Layer [r]: Add brief definition or description
- Auditing [r]: Add brief definition or description
- Internet [r]: International "network of networks" that connects computers together through the Internet Protocol Suite and supports applications like Email and the World Wide Web. [e]
- Risk analysis [r]: Add brief definition or description
- Virtual private network [r]: The emulation of a private Wide Area Network (WAN) facility using IP facilities, including the public Internet or private IP backbones. [e]
- Broadcast journalism [r]: Field of news and journals which are 'broadcast', that is, published by electrical methods, instead of the older methods, such as printed newspapers and posters. [e]
- JTRS [r]: Add brief definition or description
- Database [r]: A collection of computer-readable records, at one or more location, that are organized in some meaningful way beyond simple sequence of creation [e]
- PATRIOT Act Section 816 [r]: A section that defines the threshold of damage to computer systems, which justifies law enforcement attention; of wider use against computer crime than against terrorism alone [e]
- Computer networking session protocols [r]: A communication protocol for computer to computer networking. [e]