Security: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz No edit summary |
John Leach (talk | contribs) m (Text replacement - "{{subpages}}" to "{{PropDel}}<br><br>{{subpages}}") |
||
Line 1: | Line 1: | ||
{{subpages}} | {{PropDel}}<br><br>{{subpages}} | ||
In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. [[Information assurance]] is the broadest technical subcategory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and things from physical damage or compromise. | In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. [[Information assurance]] is the broadest technical subcategory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and things from physical damage or compromise. |
Revision as of 05:48, 8 April 2024
This article may be deleted soon. | ||
---|---|---|
In the broadest sense, security involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. Information assurance is the broadest technical subcategory, although there are aspects of law and policy beyond it. Physical security is another subcategory, involving the protection of persons, places, and things from physical damage or compromise. |