Diskussion:ISMS: Unterschied zwischen den Versionen
Erscheinungsbild
K Dirkwagner verschob die Seite Diskussion:Informationssicherheit nach Diskussion:ISMS: Textersetzung - „Informationssicherheit“ durch „ISMS“ |
K Textersetzung - „–“ durch „-“ |
||
Zeile 29: | Zeile 29: | ||
* [[Single sign-on]] | * [[Single sign-on]] | ||
* [[Verification and validation]] | * [[Verification and validation]] | ||
* [[ | * [[Gordon-Loeb model]] for cyber security investments |
Aktuelle Version vom 11. Mai 2025, 20:59 Uhr
- Capability-based security
- Computer security (cybersecurity)
- Data breach
- Data-centric security
- Enterprise information security architecture
- Identity-based security
- Information infrastructure
- Information security audit
- Information security indicators
- Information security management
- Information security standards
- Information technology
- Information technology security audit
- IT risk
- ITIL security management
- Kill chain
- List of computer security certifications
- Mobile security
- Network Security Services
- Privacy engineering
- Privacy software
- Privacy-enhancing technologies
- Security bug
- Security convergence
- Security information management
- Security level management
- Security of Information Act
- Security service (telecommunication)
- Single sign-on
- Verification and validation
- Gordon-Loeb model for cyber security investments