Search results

From KYNNpedia
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...1968]] series. The different security objectives include authentication of data transfer through [[digital signatures]], ensuring only authenticated access * ''IEC 62351-3'' — Security for any profiles including [[TCP/IP]]. ...
    4 KB (539 words) - 09:07, 14 July 2023
  • ...ut creating any current benefit or value. The risks of processing personal data vary from [[identity theft]] to unreliable inferences resulting in incorrec ...tection, and can thus be found in almost every legal or regulatory text on data protection/privacy. ...
    3 KB (353 words) - 23:42, 2 February 2024
  • {{about|the communications term|the data modelling concept|Many-to-many (data model)}} ....com/books?id=B0e6BQAAQBAJ&pg=PA880 |page=880 |title=Quality, Reliability, Security and Robustness in Heterogeneous Networks |first=Karan |author=Singh |year=2 ...
    2 KB (276 words) - 02:51, 13 April 2023
  • ...tion data from the installed metering is then collected by the appointed [[data collector]] to be submitted for billing. ...requirement for all UK electricity meters to undergo a health, safety and security inspection and meter reading every 2 years.<ref>Supplier Standard Licence C ...
    2 KB (295 words) - 03:18, 18 June 2021
  • ...not common. It was developed for communications between various types of [[data acquisition]] and control equipment. It plays a crucial role in [[SCADA]] == Security == ...
    9 KB (1,218 words) - 21:04, 24 July 2023
  • * '''Data hazards''': A piece of data that can be used to harm others, such as the [[Nucleic acid sequence|DNA se Data hazards are of particular interest to the fields of biology and pathology. ...
    8 KB (1,163 words) - 05:33, 8 March 2024
  • From:SUPIMENS SECURITY SYSTEM Subject:REPORT ON SECURITY SYSTEMS ...
    3 KB (473 words) - 22:48, 4 August 2023
  • ...ollowing the North American [[Northeast Blackout of 2003]], research among data center operators showed that – of 500 companies surveyed – nearly half expe ...to assist private and public operations that require higher power quality, security, and continuity ...
    4 KB (485 words) - 05:50, 29 December 2023
  • | name = Forum of Incident Response and Security Teams ...UIDANCE FOR IMPROVING THE COMPARABILITY OF STATISTICS PRODUCED BY COMPUTER SECURITY INCIDENT RESPONSE TEAMS|url=https://www.oecd.org/officialdocuments/publicdi ...
    9 KB (1,233 words) - 15:30, 25 October 2023
  • ...urely]] keeping track of the creation and modification time of a document. Security here means that no one—not even the owner of the document—should be able to There are many timestamping schemes with different security goals: ...
    11 KB (1,571 words) - 20:46, 17 January 2024
  • ...formation through the web, which has contributed to the commodification of data.<ref name=":1" /> == Data == ...
    11 KB (1,656 words) - 00:48, 5 February 2024
  • :[[Data (computing)]] :[[Security]] ...
    2 KB (253 words) - 05:24, 29 January 2024
  • ...l connectivity, and increasing demand for corporate espionage and personal data breaches.<ref>{{Cite web | website = National Cyber Security Alliance (StaySafeOnline.org) ...
    6 KB (741 words) - 06:46, 13 February 2024
  • ...electrical interfaces, performance requirements, and [[data communication|data transmission]] protocols. The 60870 standards are developed by [[IEC TC 57| ...-1-4:1994 General considerations - Section 4: Basic aspects of telecontrol data transmission and organization of standards IEC 870-5 and IEC 870-6 ...
    5 KB (680 words) - 13:41, 1 January 2024
  • ...ucture. The temporal order of issued time-stamps is also protected by this data structure, making backdating of the issued time-stamps impossible, even by The top of the authenticated data structure is generally ''published'' in some hard-to-modify and widely witn ...
    13 KB (1,730 words) - 03:20, 21 August 2023
  • ...trol messages between two systems, which uses permanent directly connected data circuits between the systems. The [[IEC TC 57|IEC Technical Committee 57]] * IEC 60870-5-2 Data Link Transmission Services ...
    14 KB (1,996 words) - 14:07, 12 August 2023
  • ...easoning|knowledge]] that might result in loss of an advantage or level of security if disclosed to others.<ref>{{Cite journal |last1=Mothersbaugh |first1=Davi ...ndividual, [[trade secret]]s of a business or even the [[national security|security]] and international relations of a nation depending on the level of sensiti ...
    20 KB (2,812 words) - 14:22, 26 January 2024
  • *[[Data science]] ...|first=Robert O'Harrow Jr , The Washington|title=Online firm gave victim's data to killer|url=https://www.chicagotribune.com/news/ct-xpm-2002-01-06-0201060 ...
    13 KB (1,855 words) - 19:12, 5 July 2023
  • * [[Data storage device]] === Home security === ...
    7 KB (895 words) - 16:21, 8 January 2024
  • ...r-network/ Huff, Lisa, “The Battle for the Converged Data Center Network,” Data Center Knowledge, August 18, 2011.]</ref><ref>{{Cite web |url=http://gigaom *[[Information security]]<ref name="Rasmussen">{{citation |title=How to Become an IT Manager: What ...
    11 KB (1,453 words) - 23:47, 28 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)