Category:Data security
From HandWiki
Revision as of 09:15, 24 January 2021 by imported>Rtextdoc (add)
Here is a list of articles in the Data security category of the Computing portal that unifies foundations of mathematics and computations using computers.
Subcategories
This category has the following 4 subcategories, out of 4 total.
Pages in category "Data security"
The following 159 pages are in this category, out of 159 total.
A
B
C
- Card security code
- Certified Information Systems Security Professional
- Certified information systems security professional
- Certified Penetration Testing Engineer
- Certified penetration testing engineer
- Chain of trust
- Chinese wall
- The Clean Network
- Cloud storage gateway
- Common Criteria Evaluation and Validation Scheme
- Compartmentalization (information security)
- Computer recycling
- Electronic waste recycling
- Context-based access control
- Copyright alternatives
- Cracking of wireless networks
- Crypto cloud computing
- Crypto-shredding
- Cryptographic key types
- Cryptographic splitting
- Cyber Insider Threat
- Company:Cygilant
D
F
G
I
- Inference attack
- Information diving
- Information repository
- Information security
- Information security awareness
- Information security indicators
- Information sensitivity
- Organization:Information Systems Security Association
- Organization:Information Trust Institute
- Insider threat management
- IT risk
- IT risk management
M
N
O
P
S
- Salami slicing
- Redaction
- Sanitization (classified information)
- Screened subnet
- Screening router
- Company:Secure Network
- Security controls
- Security convergence
- Company:Security First Corp
- Security information and event management
- Security level management
- Finance:Security of automated teller machines
- Security orchestration
- Self-destruct
- Separation of duties
- Sheep dip (computing)
- Signed and Encrypted Email Over The Internet
- Single-loss expectancy
- Company:Splunk
- Standard of Good Practice for Information Security
- Stateful firewall
- SWIPSY