The following is a list in alphabetical order of articles relating to security technology, law and regulations.
Trending pages
-
Biometrics -
Defense-in-depth -
Supply chain -
Intelligence process -
2008 Annual Report to Congress on Foreign Economic and Industrial Espionage -
Risk assessment
All items (5711)
"
1
2
-
2-factor authentication
-
20 Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines
- 2005 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2007 Annual Report to Congress on Foreign Economic Collection and Industrial Espionage
- 2008 Annual Report to Congress on Foreign Economic and Industrial Espionage
-
2009 IC Legal Reference Book
- 2010 National Security Strategy
- 2011 National Network of Fusion Centers: Final Report
-
2012 Strategic Plan
-
2013 Data Breach Investigations Report
-
2014 Data Breach Investigations Report
- 2014 Report to Congress 22014 Annual Report to Congress
-
24 Hour Log
A
-
A Blueprint for Digital Identity: The Role of Financial Institutions in Building Digital Identity
-
A Criticism of the Current Security, Privacy and Accountability Issues in Electronic Health Records
-
A Guide to Understanding Audit in Trusted Systems
-
A Guide to Understanding Data Remanence in Automated Information Systems
-
A Guide to Understanding Discretionary Access Control in Trusted Systems
-
A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems
-
A Guideline on Office Automation Security
-
A Look at the Legal Environment for Driverless Vehicles
-
A National Plan for Migrating to IP-Enabled 9-1-1 Systems
- A National Security Strategy for a New Century
-
A Pan-Canadian Strategy for Identity Management and Authentication
-
A Primer on Metadata: Separating Fact from Fiction
-
A Sober Look at National Security Access to Data in the Cloud
-
A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation
-
A Strategy for a Secure Information Society – “Dialogue, partnership and empowerment”
-
A Strong Britain in an Age of Uncertainty: The National Security Strategy
-
A-Space
-
Abduction
-
Able Danger
-
Absolute risk
-
Absorption
-
Absorptive capacity
-
Accept a certificate
-
Acceptable level of risk
-
Acceptable risk
-
Access agreement
-
Access approval
-
Access authority
-
Access authorization
-
Access card
-
Access category
-
Access Certificate for Electronic Services
-
Access control
-
Access control card
-
Access control center
-
Access control check
-
Access Control Decision Function
-
Access Control Decision Information
-
Access Control Enforcement Function
-
Access control function
-
Access control information
-
Access control label
-
Access control list
-
Access control measures
-
Access control mechanisms
-
Access control policy
-
Access control policy rules
-
Access Control Policy Testing Tool
-
Access control procedures
-
Access control roster
-
Access control service
-
Access control software
-
Access control system
-
Access control technologies
-
Access control token
-
Access cross domain solution
-
Access eligibility determination
-
Access evaluation
-
Access level
-
Access list
-
Access management
-
Access mode
-
Access National Agency Check with Inquiries
-
Access originator
-
Access Overload Control
-
Access path
-
Access period
-
Access privilege
-
Access privileges
-
Access profile
-
Access rights
-
Access threat
-
Access to classified information
-
Access type
-
Access With Trust
-
Access-Control-as-a-Service
-
Accidental hazard
-
Account
-
Account audit
-
Accountability
-
Accountability and Control of Classified Laptop Computers
-
Accounting legend code
-
Accreditation authority
-
Accreditation boundary
-
Accreditation level
-
Accredited Standards Committee X9
-
Accrediting authority
-
Achievements and Next Steps: Towards Global Cyber-Security
-
Acknowledged Special Access Program
-
Acoustic conference room
-
Acoustic emanation
-
Acoustic security
-
Acoustic sensor
-
Acoustical security
-
Acquisition, development, and installation controls
-
Act of Mar. 26, 1964 National Security Agency - Personnel Security Procedures
-
Action lists
-
Action Plan for Critical Infrastructure
-
Activation data
-
Active attack
-
Active Directory
-
Active electronic protective measures
-
Active infrared sensor
-
Active measurement tool
-
Active Network Intrusion Defense
-
Active security testing
-
Active threat
-
Active wiretapping
-
Activity monitor
-
Activity security manager
-
Activity Security Manager
-
Activity, Recognition and Monitoring
-
Actual state
-
Ad hoc Committee on Data Protection
-
Adaptive capacity
-
Adaptive risk
-
Adaptive threat
-
Add-on security
-
Address of record
-
Address space layout randomization
-
Adequate security
-
Adjudication
-
Adjudication authority
-
Adjudicative process
-
Adjudicator
-
Administrative access
-
Administrative account
-
Administrative alert
-
Administrative control
-
Administrative Domain
-
Administrative incident
-
Administrative Measures for the Graded Protection of Information Security
-
Administrative privileges
-
Administrative safeguards
-
Administrative security
-
Administrative vulnerability
-
Administrator
-
Administrator privileges
-
Administrator rights
-
ADP security officer
-
ADP security planner
-
ADP System Security Officer
-
Advanced authentication
-
Advanced Counterfeit Deterrence
-
Advanced Imaging Technology
-
Advanced narrowband digital voice terminal
-
Advanced Passenger Information System
-
Advanced persistent threat
-
Advanced Security Acceleration Project – Smart Grid
-
Advanced Smartcard Access Control System
-
Adversary
-
Adversary collection methodology
-
Adversary threat strategy
-
Adverse consequence
-
Adverse impact
-
Adverse information
-
Advisory
-
Advisory Committee for Information Security
-
Advisory Committee on Online Access and Security
-
Advisory sensitivity attributes
-
Advisory standards
-
Aerial surveillance
-
Aerospace and Defence Manufacturer's Information Exchange
-
Agency Certification Authority
-
Agency dashboard
-
Agency IT security program manager
-
Agent of a foreign power
-
Aggregate risk
-
Agora
-
Agreement Between the United States of America and the European Union on the Use and Transfer of Passenger Name Records to the United States Department of Homeland Security
-
Agreement to operate
-
Air Force Agency for National Security and Emergency Preparedness
-
Air Force Computer Emergency Response Team
- Air Force Cyber
-
Air Force Electronic Warfare Evaluation Simulator
-
Air Force Network Operations and Security Center Network Security Division
-
Air Force Network Operations Security Center
-
Air gap
-
Air Intelligence Agency