• The following outline is provided as an overview of and topical guide to computer security: Computer security is commonly known as security applied to computing...
    51 KB (5,291 words) - 08:57, 18 July 2024
  • Torvalds Outline of computer engineering Outline of computer programming Outline of computer science Outline of computer security Outline of computer vision...
    5 KB (315 words) - 13:02, 24 February 2024
  • often including error correction. Computer security – Practical aspects of securing computer systems and computer networks. Cryptography – Applies results...
    11 KB (1,042 words) - 02:49, 30 June 2024
  • Theory of Secrecy Systems – cryptography from the viewpoint of information theory Security engineering Outline of computer science Outline of computer security...
    20 KB (1,890 words) - 03:11, 18 August 2024
  • Thumbnail for Computer security
    Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer software, systems and...
    219 KB (22,183 words) - 15:39, 20 August 2024
  • Information privacy (category Wikipedia articles in need of updating from July 2024)
    software Web literacy (privacy) Computer science specific Authentication CIA triad Outline of computer security Data security Data sovereignty Data localization...
    36 KB (4,040 words) - 01:43, 3 August 2024
  • Thumbnail for Risk Management Framework
    Risk Management Framework (category Computer security procedures)
    Architecture NIST Cybersecurity Framework Cyber Risk Quantification Outline of computer security Joint Task Force (December 2018), SP 800-37 Rev. 2 - Risk Management...
    13 KB (1,605 words) - 15:18, 20 August 2024
  • following outline is provided as an overview of and topical guide to computing: Computing – activity of using and improving computer hardware and computer software...
    12 KB (961 words) - 12:07, 30 October 2023
  • A network security policy (NSP) is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out...
    2 KB (269 words) - 08:31, 29 May 2024
  • following outline is provided as an overview of and topical guide to human–computer interaction: Human–Computer Interaction (HCI) – the intersection of computer...
    15 KB (1,471 words) - 13:04, 24 February 2024
  • engineering Electrical engineering (outline) Broadcast engineering Computer engineering (outline) Power systems engineering Telecommunications engineering Electronic...
    10 KB (797 words) - 21:37, 30 June 2024
  • Thumbnail for Outline of academic disciplines
    (Humanities computing) History of computer hardware History of computer science (outline) Humanistic informatics Databases (outline) Distributed databases Object...
    66 KB (4,453 words) - 13:45, 22 August 2024
  • Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context...
    9 KB (1,064 words) - 07:27, 1 August 2024
  • Computer security Internet security Network security Information security, Data security List of computer security certifications The art of secret writing...
    19 KB (1,784 words) - 10:05, 3 June 2024
  • Thumbnail for List of academic fields
    computing) History of computer hardware History of computer science (outline) Humanistic informatics Community informatics See also Branches of mathematics and...
    77 KB (4,651 words) - 13:23, 22 August 2024
  • Information security standards (also cyber security standards) are techniques generally outlined in published materials that attempt to protect the cyber...
    23 KB (2,613 words) - 04:04, 1 August 2024
  • referred to as an information technology security audit or a computer security audit. However, information security encompasses much more than IT. The auditor...
    31 KB (4,030 words) - 05:30, 28 July 2024
  • Thumbnail for Human–computer interaction
    bibliography of Human Computer Interaction literature Information architecture Information design Mindfulness and technology Outline of human–computer interaction...
    50 KB (5,979 words) - 11:27, 6 August 2024
  • Protection of digital computer and communication systems and networks NEI 08-09: Cybersecurity Plan for Nuclear Power Plants Computer security compromised...
    6 KB (616 words) - 19:24, 21 December 2023
  • Thumbnail for Computer
    computers List of pioneers in computer science Outline of computers Pulse computation TOP500 (list of most powerful computers) Unconventional computing According...
    136 KB (13,741 words) - 14:13, 16 August 2024
  • Penetration test (category Computer network security)
    pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability...
    28 KB (3,392 words) - 23:45, 1 August 2024
  • Thumbnail for Computer science
    fields of cryptography and computer security involve studying the means for secure communication and preventing security vulnerabilities. Computer graphics...
    72 KB (6,770 words) - 01:31, 25 August 2024
  • competence. In November 1988, the Special Interest Group for Computer Security (SIG-CS), a member of the Data Processing Management Association (DPMA), brought...
    21 KB (2,007 words) - 18:04, 15 August 2024
  • computer systems, or other assets. In the field of information security, such controls protect the confidentiality, integrity and availability of information...
    13 KB (1,411 words) - 21:42, 30 July 2024
  • Thumbnail for National Security Agency
    National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence...
    253 KB (24,199 words) - 09:38, 19 August 2024
  • Security information and event management (SIEM) is a field within the field of computer security, where software products and services combine security...
    35 KB (4,093 words) - 02:18, 27 July 2024
  • implementation of mandatory policies, principles, standards, and guidelines on information security." However, the regulations do not address numerous computer-related...
    47 KB (5,415 words) - 00:55, 15 August 2024
  • The following outline is provided as an overview of and topical guide to applied science: Applied science – the branch of science that applies existing...
    30 KB (3,405 words) - 09:09, 3 August 2024
  • following outline is provided as an overview of and topical guide to the Internet. The Internet is a worldwide, publicly accessible network of interconnected...
    14 KB (1,379 words) - 08:10, 27 May 2024
  • Reflection attack (category Computer security exploits)
    In computer security, a reflection attack is a method of attacking a challenge–response authentication system that uses the same protocol in both directions...
    3 KB (434 words) - 22:19, 1 February 2023