JavaScriptMessages

APECAsia Pacific Economic Cooperation

.English.Español.tiếng Việt.По-русски.한국어.日本語.简体中文版HomeNewsRss FeedsSiteMap
  • Academics
    • Tools
      • Tool Downloads (Pg. 1)
      • Tool Downloads (Pg. 2)
      • Tool Downloads (Pg. 3)
      • Tool Downloads (Pg. 4)
  • Curriculum
    • CNSS Standards
    • Ethics and Law
    • K-12 Material
    • NSA Centers of Excellence
    • Teaching Materials
      • 4012 Presentation
      • Course Modules
        • Module 1
          • 01. (I) Corporate Resource
          • 02. (II) Basic Problems
          • 03. (III) Ethical Issues
          • 04. (IV) Studies
          • Teaching Considerations
        • Module 2
          • 01. (I) Ethics
          • 02. (II) Environment
          • 03. (III) Physical
          • 04. (IV) Data
          • 05. (V) Security Training
          • Teaching Considerations
        • Module 3
          • 01. (I) Planning
          • 02. (II) Organizational Policies & Procedures
          • 03. (III) Ethics and Professionalism
          • 04. (IV) Personnel Security
          • 05. (V) Physical Security
          • 06. (VI) System Security
          • 07. (VII) Threats & Vulnerabilities
          • 08. (VIII) Data Security & Recovery
          • 09. (IX) Control and Audit
          • 10. (X) Costs and Benefits
          • Teaching Considerations
        • Module 4
          • 01. (I) Underlying Problem
          • 02. (II) Laws as Tools for Information Security
          • 03. (III) Laws and Legislation as Legal Options to
          • Teaching Considerations
        • Module 5
          • 01. (I) Overview
          • 02. (II) System Sensitivity
          • 03. (III) Security Requirements
          • 04. (IV) Levels of Security
          • 05. (V) Data Life Cycles
          • 06. (VI) Sample Protection Plan
          • Teaching Considerations
        • Module 6
          • 01. (I) Overview
          • 02. (II) Threats
          • 03. (III) Countermeasures
          • 04. (IV) Tradeoffs-Costs & Benefits
          • 05. (V) Network Design
          • Teaching Considerations
        • Module 7
          • 01. (I) Overview
          • 02. (II) Development of Security Program
          • 03. (III) Risk Analysis
          • 04. (IV) Contingency Planning
          • 05. (V) Legal Issues for Managers
          • 06. (VI) System Validation & Verification (Accredi
          • 07. (VII) Information Systems Audit
          • 08. (VIII) Computer Security Check List
          • Teaching Considerations
        • Module 8
      • Course Modules Website
      • Course Videos
      • IA Videos
        • Videos (Pg. 1)
        • Videos (Pg. 2)
        • Videos (Pg. 3)
        • Videos (Pg. 4)
        • Videos (Pg. 5)
        • Videos (Pg. 6)
        • Videos (Pg. 7)
  • External Links
    • Academic Sites
    • Government Sites
    • Independent Organizations
    • Industry Sites
  • General Interest
    • Common Criteria
    • IA Activities
    • Professional Certification
    • Seminal Works
      • Seminal Papers
  • Glossary
  • Publications
    • Government Documents
      • Gov Docs (Pg. 1)
      • Gov Docs (Pg. 2)
      • Gov Docs (Pg. 3)
      • Gov Docs (Pg. 4)
      • Gov Docs (Pg. 5)
      • Gov Docs (Pg. 6)
    • IA Posters
      • IA Posters (Pg. 1)
      • IA Posters (Pg. 2)
      • IA Posters (Pg. 3)
      • IA Posters (Pg. 4)
      • IA Posters (Pg. 5)
      • IA Posters (Pg. 6)
    • Industry Documents
    • NIATEC Publications
    • Older Papers
    • Publisher Databases
Login

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Return to List
Q
QA
Q-bit (quantum bit)
QC
QKD (quantum key distribution)
QOS
QOT&E
QT&E
Quad
QUADRANT
Quadruple Bucky
Qualitative threat analysis
Quality Assurance
Quality Control
Quality Of Service
Quantifiers
Quantization
Quantization Level
Quantum bit (Q-bit)
Quantum Bogodynamics
Quantum computing
Quantum key cracking
Quantum key distribution (QKD)
Quarter
Quartz Clock
Ques
Queue
Queue Traffic
Queueing
Queueing Delay
Quick-And-Dirty
Quine
Quote Chapter And Verse
Quotient
QWERTY
Queueing
  • The process of entering elements into or removing elements from a queue. See also buffer, queue traffic.

IRI, Pocatello, Idaho | NIATEC | Version: 2.2.1.4 | | 6 Mar 2019