Search results

Jump to navigation Jump to search
  • ====[[IETF]]==== ...a global scale. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    934 bytes (105 words) - 12:26, 15 August 2022
  • == The Internet Engineering Task Force (IETF) has defined the following terms == {{#ask: [[Category:Main]][[defined by::IETF]] | format=category | limit=1000 }}
    1 KB (159 words) - 01:09, 29 June 2019
  • ====[[IETF]]==== ...a specified way.<ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    2 KB (260 words) - 23:20, 27 June 2019
  • ...le. Each new definition should be formatted as a heading level 4, followed by the unformatted text of the definition. An example follows below: ==== Unit ====[[IETF]]====
    3 KB (437 words) - 17:06, 11 July 2019
  • ...le. Each new definition should be formatted as a heading level 4, followed by the unformatted text of the definition. An example follows below: ==== Unit ...ateway interconnects networks with different network protocol technologies by performing the required protocol conversions. <br /><br/>
    5 KB (683 words) - 17:09, 11 July 2019
  • ...the property that information was produced, issued, modified or destroyed by a certain individual, a system, agency or entity.}} <br /><br/> ====[[IETF]]====
    9 KB (1,220 words) - 22:52, 25 May 2023
  • ====[[IETF]]==== ...ystem's mission. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    8 KB (1,120 words) - 21:35, 5 July 2023
  • ...finition|Network means the interconnection of two or more computer systems by which data processing service can be provided or received. <ref>[http://www ====[[IETF]]====
    6 KB (876 words) - 14:10, 15 August 2022
  • ...ng power above a minimum defined value. This inability to transmit above a defined power level is termed Forced Outage Rate (F.O.R.).<br/> ====[[IETF]]====
    6 KB (835 words) - 22:58, 25 May 2023
  • ====[[IETF]]==== ...s and functions. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    8 KB (1,058 words) - 01:39, 3 March 2023
  • ====[[IETF]]==== ...by=IAEA|defined by=Egypt|defined by=Italy|defined by=United States|defined by=DHS}}
    2 KB (324 words) - 12:47, 15 August 2022
  • ...for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}}By a ''direct attack'' on a system they exploit deficiencies in the underlying ...sed psychological attack on citizens or digital identity theft perpetrated by different techniques. <ref>[http://www.hopr.gov.et/c/document_library/get_f
    15 KB (2,040 words) - 22:08, 19 February 2022
  • ...sibility of exercising decisive influence on an undertaking, in particular by: (a) ownership or the right to use all or part of the assets of an undertak ...ity, combined with the capability to manage resources, in order to achieve defined objectives. <ref>[https://www.gov.uk/government/uploads/system/uploads/atta
    11 KB (1,528 words) - 14:07, 15 August 2022
  • ...ition|Acceptable risk: Degree of human and material loss that is perceived by the community or relevant authorities as tolerable in actions to minimize d ====[[IETF]]====
    11 KB (1,428 words) - 13:32, 15 August 2022
  • ====[[IETF]]==== ...ve been applied. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    13 KB (1,568 words) - 13:34, 15 August 2022
  • ...biometrical traits (fingerprint). A higher security level can be achieved by the combination of different traits used for authentication.<br/><br/> ..., such as a token or PIN, is required in addition to the first one this is defined as 2-factor authentication. <ref>[https://digital.nhs.uk/services/data-and
    17 KB (2,375 words) - 17:07, 15 August 2022
  • ...he data has been received or to protect the recipient against false denial by the sender that the data has been sent. <ref>[http://www.dgqadefence.gov.in ...origin of data in such a way that the integrity and origin can be verified by a third party as having originated from a specific entity in possession of
    15 KB (2,048 words) - 23:07, 25 May 2023
  • ...rastructure and the risk of loss due to a disruption in essential services by minimizing the vulnerability of critical infrastructure assets, systems and {{definition|Security: Measures taken by a military unit, an activity or installation to protect itself against all
    17 KB (2,360 words) - 22:24, 19 February 2022
  • ...on|Availability is the property of being accessible and usable upon demand by an authorized entity. <ref>[https://www-ns.iaea.org/downloads/security/nuc {{definition|The property of being accessible and useable upon demand by an authorized entity. <ref>ITU Security in Telecommunications and Informati
    26 KB (3,485 words) - 22:52, 25 May 2023
  • ...on|Recovery is those capabilities necessary to assist communities affected by an [[incident]] to recover effectively, including, but not limited to, rebu ====[[IETF]]====
    22 KB (2,752 words) - 11:24, 1 April 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)