Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Recurring concepts== Certain concepts recur throughout different fields of security: * [[Access control]] β the selective restriction of access to a place or other resource. * [[Assurance services|Assurance]] β an expression of confidence that a security measure will perform as expected. * [[Authorization]] β the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular. * [[Cipher]] β an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible. * [[Countermeasure]] β a means of preventing an act or system from having its intended effect. * [[Defense in depth]] β a school of thought holding that a wider range of security measures will enhance security. * [[Exploit (computer security)|Exploit]] (noun) β a means of capitalizing on a vulnerability in a security system (usually a cyber-security system). * [[Identity management]] β enables the right individuals to access the right resources at the right times and for the right reasons. * [[Password]] β secret data, typically a string of characters, usually used to confirm a user's identity. * [[Resilience (organizational)|Resilience]] β the degree to which a person, community, nation or system is able to resist adverse external forces. * [[Risk]] β a possible event which could lead to damage, harm, or loss. * [[Security management]] β identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. * [[Security seal]] * [[Threat]] β a potential source of harm. * [[Vulnerability]] β the degree to which something may be changed (usually in an unwanted manner) by external forces.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)