Network security policy
flowchart AA["Associated Authors (0)"] C[Network security policy] BC["Broader Concepts (2)"] NC["Narrower Concepts (14)"] C== skos:broader ==>BC NC== skos:broader ==>C AA== dcterms:relation ==>C click BC "#broader-concepts" click NC "#narrower-concepts" click AA "#associated-authors" NI["add incoming edge"] NO["add outgoing edge"] NI-- ? -->C C-- ? -->NO click NI "#add-incoming-edge" click NO "#add-outgoing-edge" style NI stroke-width:2px,stroke-dasharray: 5 5 style NO stroke-width:2px,stroke-dasharray: 5 5
- Wikidata
- https://www.wikidata.org/wiki/Q3394676
- OpenAlex ID
- https://openalex.org/C117110713 (API record)
- OpenAlex Description
- generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment
- OpenAlex Level [?]
- 4
Broader Concepts
Narrower Concepts
- Certified Information Security Manager
- Certified Information Systems Security Professional
- Control system security
- Critical security studies
- Human-computer interaction in information security
- ITIL security management
- Information security audit
- Information security standards
- Logical security
- Security convergence
- Security engineering
- Sherwood Applied Business Security Architecture
- Standard of Good Practice
- Threat
Associated Authors
Add Incoming Edge
Login via ORCiD to contribute.
Add Outgoing Edge
Login via ORCiD to contribute.