Category:Data security
![]() | Computing portal |
Here is a list of articles in the Data security category of the Computing portal that unifies foundations of mathematics and computations using computers.
Subcategories
This category has the following 7 subcategories, out of 7 total.
A
B
D
F
I
Pages in category "Data security"
The following 137 pages are in this category, out of 137 total.
- Data security (computing)
- Template:Firewall software
2
- 2009 Sidekick data loss (computing)
A
- Actiance (company)
- Active hard-drive protection (computing)
- Adaptive Redaction (computing)
- Administrative share (computing)
- Agbogbloshie (computing)
- Air gap (networking) (computing)
- Anomaly detection (computing)
- Asset (computer security) (computing)
- AuthenTec (company)
B
- Backup (computing)
- Backup sync share (computing)
- Glossary of backup terms (computing)
- Backup validation (computing)
- Biometric passport (computing)
- Biometric tokenization (computing)
- Blancco (computing)
- BPO security (computing)
- Budapest Declaration on Machine Readable Travel Documents (computing)
- Bulk personal datasets (computing)
C
- Certified Information Systems Security Professional (computing)
- Certified Penetration Testing Engineer (computing)
- Chinese wall (computing)
- Cloud storage gateway (engineering)
- Common Criteria Evaluation and Validation Scheme (computing)
- Compartmentalization (information security) (computing)
- Computer recycling (computing)
- Context-based access control (computing)
- Copyright alternatives (computing)
- Cracking of wireless networks (computing)
- CronLab (company)
- Crypto cloud computing (computing)
- Crypto-shredding (computing)
- Cryptographic key types (computing)
- Cryptographic splitting (computing)
- Cyber Insider Threat (computing)
- Cygilant (company)
D
- Data architect (computing)
- Data breach (computing)
- Data center security (computing)
- Data exfiltration (computing)
- Data loss prevention software (computing)
- Data theft (computing)
- Data validation (computing)
- De-perimeterisation (computing)
- Defense in depth (computing) (computing)
- Digify (company)
- Domain Based Security (computing)
- Doxing (computing)
E
- Electronic seal (computing)
- Enterprise client-server backup (computing)
- Extended Access Control (computing)
- Extrusion detection (computing)
F
- Federation Against Software Theft (computing)
- FinalCode (company)
- Firewall (computing) (computing)
- First Department (computing)
- Fluentd (software)
G
- GateKeeper (access control device) (software)
- Generally Accepted Privacy Principles (computing)
- Gordon–Loeb model (computing)
- GTB Technologies (company)
- Guard (information security) (computing)
H
- Holistic Information Security Practitioner (computing)
I
- Inference attack (computing)
- Information diving (computing)
- Information repository (computing)
- Information security (computing)
- Information security awareness (computing)
- Information security indicators (computing)
- Information sensitivity (computing)
- Information Systems Security Association (organization)
- Information Trust Institute (organization)
- Insider threat management (computing)
- IT risk (computing)
- IT risk management (computing)
K
- Key management (computing)
- Kill chain (computing)
L
- List of data breaches (computing)
- Loggly (company)
- LogLogic (company)
M
- Malware Information Sharing Platform (software)
- Mayfield's paradox (computing)
- McCumber cube (computing)
- Medicine:Medical data breach
- Merritt method (computing)
- Misuse detection (computing)
- Multi-party authorization (computing)
- MyDLP (software)
N
- National Industrial Security Program (computing)
- National Information Assurance Partnership (computing)
- NIST RBAC model (computing)
O
- Offensive Security (company)
- Offline private key (computing)
- Offline private key protocol (computing)
- Open Information Security Maturity Model (computing)
P
- Password fatigue (computing)
- Personal data (computing)
- Personally identifiable information (computing)
- Pod slurping (computing)
- Purple Penelope (computing)
R
- Relocatable user backup (computing)
- Rublon (software)
S
- Salami slicing (computing)
- Sanitization (classified information) (computing)
- Screened subnet (computing)
- Screening router (computing)
- Secure Network (company)
- Security controls (computing)
- Security convergence (computing)
- Security First Corp (company)
- Security information and event management (computing)
- Security information management (computing)
- Security level management (computing)
- Security of automated teller machines (computing)
- Self-destruct (computing)
- Separation of duties (computing)
- Sheep dip (computing) (computing)
- Signed and Encrypted Email Over The Internet (computing)
- Single-loss expectancy (computing)
- Splunk (company)
- Standard of Good Practice for Information Security (computing)
- SWIPSY (computing)
T
- Threat Intelligence Platform (engineering)
- Transient-key cryptography (computing)
- Transshipment (information security) (computing)
- Paper key (computing)
U
- United Kingdom government security breaches (computing)
- User activity monitoring (computing)
V
- V-Key (company)
- Verinice (software)
- Virtual private database (computing)
W
- Wireless identity theft (computing)
- Wireless intrusion prevention system (computing)
Z
- Zero Trust (computing)