• Compartmentalization, in information security, whether public or private, is the limiting of access to information to persons or other entities on a need-to-know...
    3 KB (343 words) - 22:06, 25 October 2024
  • (biology) Compartmentalization (engineering) Compartmentalization (fire protection) Compartmentalization (information security) Compartmentalization (psychology)...
    406 bytes (64 words) - 18:43, 3 January 2018
  • (programming) Compartmentalization (information security) Law of Demeter Rogers, Wm. Paul (18 May 2001). "Encapsulation is not information hiding". JavaWorld...
    11 KB (1,496 words) - 19:04, 7 June 2024
  • Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically...
    161 KB (18,145 words) - 19:06, 11 June 2025
  • Thumbnail for Sensitive compartmented information facility
    A sensitive compartmented information facility (SCIF /skɪf/), in United States military, national security/national defense and intelligence parlance,...
    9 KB (851 words) - 22:02, 7 May 2025
  • 5/5e, 6/6a, 7/7a (F) A classification in a system of compartmentalization (information security) All pages with titles containing Category Categorical...
    2 KB (262 words) - 19:37, 3 June 2025
  • Office List X site Compartmentalization (information security) Security vetting in the United Kingdom An Introduction to Government Security Classifications...
    16 KB (1,911 words) - 19:55, 8 October 2024
  • Thumbnail for Black project
    (IX-529) experimental stealth US Navy ship Black operation Compartmentalization (information security) Open secret List of established military terms List of...
    5 KB (514 words) - 12:38, 20 June 2025
  • Thumbnail for Sensitive compartmented information
    George W. Bush shortly after the 9/11 attacks. For information about this program, a new security compartment was created which was given STELLARWIND...
    13 KB (1,537 words) - 03:00, 31 May 2025
  • Special access program (category Classified information in the United States)
    Organization classified information at the staff level Compartmentalization (information security) State secrets privilege Information Security Program (PDF) (Report)...
    17 KB (1,686 words) - 11:18, 31 December 2024
  • of speech) Coded set Commercial code (communications) Compartmentalization (information security) Duress code Error correction and detection Marine VHF...
    993 bytes (130 words) - 09:07, 28 April 2025
  • Need to know (category Computer security procedures)
    Obligation on a party to prove their case Compartmentalization (information security) – Limiting access to information on a need-to-know basis Duty to warn –...
    6 KB (831 words) - 18:04, 19 June 2025
  • States security clearance is an official determination that an individual may access information classified by the United States Government. Security clearances...
    34 KB (3,659 words) - 03:24, 4 June 2025
  • management that can be exploited by a malicious actor to compromise its security. Despite a system administrator's best efforts to achieve complete correctness...
    27 KB (3,333 words) - 03:19, 9 June 2025
  • Thumbnail for Ministry of State Security (China)
    The Ministry of State Security (MSS) is the principal civilian intelligence and security service of the People's Republic of China, responsible for foreign...
    108 KB (10,544 words) - 10:46, 21 June 2025
  • Thumbnail for Directorate General for External Security
    in varied western countries, at least by reason of the rule of "compartmentalization" or need to know. The DGSE exploited a network called "Nicobar",...
    57 KB (6,450 words) - 10:44, 21 June 2025
  • Thumbnail for Global Information Grid
    (including applications), data, security services, other associated services, and National Security Systems. Non-GIG Information Technology (IT) includes stand-alone...
    9 KB (1,004 words) - 07:17, 1 December 2024
  • become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern....
    90 KB (11,017 words) - 22:11, 19 June 2025
  • Principle of least privilege (category Information theory)
    In information security, computer science, and other fields, the principle of least privilege (PoLP), also known as the principle of minimal privilege...
    15 KB (1,761 words) - 17:55, 19 May 2025
  • Thumbnail for Tokenization (data security)
    technology. Besides that, tokenization enables the simple and efficient compartmentalization and management of data across multiple users. Individual tokens created...
    38 KB (4,358 words) - 23:59, 25 May 2025
  • Thumbnail for PRISM
    Security Committee June 11, "I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information"...
    187 KB (17,248 words) - 07:36, 24 June 2025
  • There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system...
    45 KB (5,802 words) - 12:27, 25 November 2024
  • Thumbnail for Psychological operations (United States)
    level compartmentalization. Further, black PSYOP, to be credible, may need to disclose sensitive material, with the damage caused by information disclosure...
    90 KB (10,404 words) - 18:50, 26 May 2025
  • Failing badly (category Security engineering)
    Failing badly and failing well are concepts in systems security and network security (and engineering in general) describing how a system reacts to failure...
    5 KB (630 words) - 04:56, 2 November 2024
  • Stovepiping (category National security)
    stovepiping is the presentation of information without proper context. It can be caused by the specialized nature or security requirements of a particular...
    11 KB (1,472 words) - 08:41, 25 May 2025
  • organizations, a system of compartmentalizing information exists to prevent the uncontrolled dissemination of information considered to be sensitive or...
    13 KB (1,821 words) - 17:55, 27 April 2025
  • Comparison of Linux distributions (category Articles with obsolete information from June 2024)
    motivated by historical reasons. Other criteria include security, including how quickly security upgrades are available; ease of package management; and...
    139 KB (4,238 words) - 01:33, 31 May 2025
  • Autonomic networking (category Information technology governance)
    approach, autonomic networking targets a more flexible structure termed compartmentalization. The goal is to produce an architectural design that enables flexible...
    19 KB (2,281 words) - 14:26, 18 November 2024
  • Thumbnail for September 11 attacks
    "A Formal Risk-Effectiveness Analysis Proposal for the Compartmentalized Intelligence Security Structure". International Journal of Intelligence and CounterIntelligence...
    317 KB (30,063 words) - 18:47, 24 June 2025
  • Thumbnail for Manhattan Project
    extreme version of compartmentalization (the need-to-know policy): Compartmentalization of knowledge, to me, was the very heart of security. My rule was simple...
    186 KB (22,198 words) - 14:31, 24 June 2025