-
1 authorized password
Безопасность: законный пароль, назначенный пароль -
2 authorized password
назначенный (законный) парольАнгло-русский словарь по компьютерной безопасности > authorized password
-
3 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
4 access
1) доступ (в систему обработки информации или в сеть связи)2) доступ (на защищенную территорию); способ доступа -
5 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
6 level
См. также в других словарях:
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
password — A security method that identifies a specific, authorized user of a computer system, a network, or a resource by a unique string of characters. In general, passwords should be a mixture of upper and lowercase letters and numbers and should… … Dictionary of networking
password — pass•word [[t]ˈpæsˌwɜrd, ˈpɑs [/t]] n. 1) a secret word or expression used by authorized persons to gain access, information, etc 2) cmp a string of characters typed into a computer to identify and obtain access for an authorized user • Etymology … From formal English to slang
password — /pas werrd , pahs /, n. 1. a secret word or expression used by authorized persons to prove their right to access, information, etc. 2. a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in … Universalium
password — A word or code used to identify an authorized user … IT glossary of terms, acronyms and abbreviations
Logical security — consists of software safeguards for an organization’s systems, including user ID and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or… … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia