The following is a list in alphabetical order of articles relating to security technology, law and regulations.
“The National Media Exploitation Center (NMEC) was established in late 2001 to coordinate FBI...National Media Exploitation Center
“A threat agent (also called a threat actor is ↑ Information Security Guide 2 - Glossary (made...Threat agent
“An electronic attack (EA) is An electronic attack, most commonly referred to as an...Electronic attack
“A host-based firewall is a piece of software running on a single host that can restrict incoming...Host-based firewall
“A privileged user is a "user who [has] an elevated level of access to a network, computer...Privileged user
“An Interconnection Security Agreement (ISA) is References ↑ NIST Special Publication 800-47, at D-1.Interconnection Security Agreement
Pages in category "Security"
The following 200 pages are in this category, out of 5,539 total.