author, editor
106
edits
Arubberdog (talk | contribs) m (→Mitigations) |
(Formatting, fix citation, add category) Tag: 2017 source edit |
||
| Line 1: | Line 1: | ||
Operations security (OPSEC) is a term describing the protection of sensitive information. Originally coined by the US military, it has been adopted in other sectors such as information technology (IT).<ref>{{Cite web |date=2023-07-06 |title=What is OPSEC? |url=https://www.sans.org/blog/what-is-opsec |access-date=2025-11-21 |website=SANS Institute |language=en}}</ref> In the context of kink, it means preventing personally identifiable information from being exposed in a way that would compromise one's social life, profession, and personal safety. | '''Operations security''' ('''OPSEC''') is a term describing the protection of sensitive information. Originally coined by the US military, it has been adopted in other sectors such as information technology (IT).<ref>{{Cite web |date=2023-07-06 |title=What is OPSEC? |url=https://www.sans.org/blog/what-is-opsec |access-date=2025-11-21 |website=SANS Institute |language=en}}</ref> | ||
In the context of kink, it means preventing personally identifiable information from being exposed in a way that would compromise one's social life, profession, and personal safety. | |||
== Personally identifiable information == | == Personally identifiable information == | ||
Personally identifiable information (PII) is any information that can be used to identify an individual, either alone or when paired with another piece of information.<ref>{{Cite web |title=personally identifiable information |url=https://csrc.nist.gov/glossary/term/personally_identifiable_information | Personally identifiable information (PII) is any information that can be used to identify an individual, either alone or when paired with another piece of information.<ref>{{Cite web |title=personally identifiable information |url=https://csrc.nist.gov/glossary/term/personally_identifiable_information |access-date=2025-11-21 |website=NIST Computer Security Resource Center}}</ref> These can include: | ||
* Legal name | * Legal name | ||
| Line 26: | Line 28: | ||
== References == | == References == | ||
<references /> | <references /> | ||
[[Category:Mitigations]] | |||