Category:Data security
From Wikipedia, the free encyclopedia
| Wikimedia Commons has media related to Computer security. |
The main article for this category is Data security.
Subcategories
This category has the following 10 subcategories, out of 10 total.
A
B
C
D
E
F
I
Pages in category "Data security"
The following 137 pages are in this category, out of 137 total. This list may not reflect recent changes (learn more).
A
B
C
- Certified Information Security Manager
- Certified Information Systems Auditor
- Certified Information Systems Security Professional
- Certified Penetration Testing Engineer
- Chinese wall
- Cloud storage gateway
- Common Criteria Evaluation and Validation Scheme
- Compartmentalization (information security)
- Computer recycling
- Context-based access control
- Copyright Alternatives
- Cracking of wireless networks
- CronLab
- Crypto cloud computing
- Cryptographic splitting
- Cyber Insider Threat
D
G
I
- Inference attack
- Information diving
- Information repository
- Information security
- Information security awareness
- Information security indicators
- Information security management system
- Information sensitivity
- Information Systems Security Association
- Information Trust Institute
- IT risk
- IT risk management
M
P
S
- Salami slicing
- Sanitization (classified information)
- Screened-subnet firewall
- Screening router
- Secure Network
- Security controls
- Security convergence
- Security First Corp
- Security information and event management
- Security information management
- Security level management
- Security of Automated Teller Machines
- Self-destruct
- Separation of duties
- Sheep dip (computing)
- Signed and Encrypted Email Over The Internet
- Single-loss expectancy
- Splunk
- Standard of Good Practice
- Sumo Logic
- SWIPSY