Category:Computer security procedures
From HandWiki
Here is a list of articles in the category Computer security procedures of the Computing portal that unifies foundations of mathematics and computations using computers.
Pages in this category should be moved to subcategories where applicable. This category may require frequent maintenance to avoid becoming too large. It should directly contain very few, if any, pages and should mainly contain subcategories. |
This category contains articles on computer security procedures including strategies, guidelines, policies, standards, specifications, regulations and laws.
Subcategories
This category has only the following subcategory.
Q
- Computer security qualifications (12 P)
Pages in category "Computer security procedures"
The following 84 pages are in this category, out of 84 total.
A
C
- CBL Index
- CESG Claims Tested Mark
- Software:Chroot
- Code sanitizer
- Commercial Product Assurance
- Organization:Common Criteria Testing Laboratory
- Composite Blocking List
- Computer forensics
- Computer security policy
- Computer Underground Digest
- Coordinated vulnerability disclosure
- Organization:Cryptographic Module Testing Laboratory
- Cyber resilience
- Control system security
- Cyber spying
- Cyber threat hunting
- Cyber-collection
- Cyber-security regulation
- Cyber security standards
- Cybersecurity standards
- Information security standards
- IT security standards
- Cyberwarfare