Security: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized ...) |
imported>Howard C. Berkowitz No edit summary |
||
Line 1: | Line 1: | ||
{{subpages}} | |||
In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. [[Information assurance]] is the broadest technical subcategory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and things from physical damage or compromise. | In the broadest sense, '''security''' involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. [[Information assurance]] is the broadest technical subcategory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and things from physical damage or compromise. |
Revision as of 10:51, 27 February 2010
In the broadest sense, security involves defining the legitimate users of resources, and then imposing methods to make sure those users have access to the resources and unauthorized users do not. Information assurance is the broadest technical subcategory, although there are aspects of law and policy beyond it. Physical security is another subcategory, involving the protection of persons, places, and things from physical damage or compromise.