Skip to content

general/data-security

Surf Wiki
De-perimeterisation

Concept in information security

general/data-security
Signed and Encrypted Email Over The Internet
general/data-security
Extrusion detection

Type of access control

general/data-security
Asset (computer security)

Data, device, or other component of a computing environment

general/data-security
Actiance
general/data-security
McCumber cube

Type of security model

general/data-security
Jericho Forum

Communication technology forum

general/data-security
Pod slurping
general/data-security
Security of automated teller machines

none

general/data-security
Verinice
general/data-security
Misuse detection
general/data-security
Self-destruct

Mechanism to cause a device to destroy itself

general/data-security
IT risk

Any risk related to information technology

general/data-security
Data loss prevention software

Concept of data breach protection

general/data-security
Compartmentalization (information security)

Limiting access to information on a need-to-know basis

general/data-security
Password fatigue

Feeling of people who require excessive passwords

general/data-security
Multi-party authorization

Software protection protocol

general/data-security
Backup validation
general/data-security
Guard (information security)
general/data-security
Relocatable user backup
general/data-security
Security level management

Quality assurance system for cybersecurity

general/data-security
Security information and event management

Field of computer security

general/data-security
Data security

Process of securing digital information

general/data-security