-
1 аудиторская проверка безопасности информации в информационной системе
аудиторская проверка безопасности информации в информационной системе
аудит безопасности информации в информационной системе
Проверка реализованных в информационной системе процедур обеспечения безопасности информации с целью оценки их эффективности и корректности, а также разработки предложений по их совершенствованию [1].
[Р 50.1.056-2005 ]Тематики
Синонимы
EN
Русско-английский словарь нормативно-технической терминологии > аудиторская проверка безопасности информации в информационной системе
-
2 проверка вычислительной системы
Engineering: computer-system auditУниверсальный русско-английский словарь > проверка вычислительной системы
-
3 следящая система
1. servo2. servomechanism3. servosystem4. follow-up systemусиленная эксплуатация, потогонная система — sweating system
5. follower arrangementпроведение ревизии; карточная система — audit arrangements
Русско-английский большой базовый словарь > следящая система
-
4 обслуживающий персонал
1. servicers2. computer personnel3. installation personnelперсонал, обслуживающий хранилище — warehousing personnel
4. maintenance staff5. operating personnel6. operations staffоператоры; оперативный персонал — operations staff
7. personnel operation8. service technicians9. servicemen10. servicer11. service personnel12. housekeeping staffРусско-английский большой базовый словарь > обслуживающий персонал
См. также в других словарях:
Computer-aided audit tools — Computer assisted audit techniques or computer aided audit tools (CAATS), also known as computer assisted audit tools and techniques (CAATTs), is a growing field within the financial audit profession. CAATTs is the practice of using computers to… … Wikipedia
Computer Aided Audit Tools — Computer Assisted Audit Techniques or Computer Aided Audit Tools (CAATS), also known as Computer Assisted Audit Tools and Techniques (CAATTs), is a growing field within the Financial audit profession. CAATTs is the practice of using computers to… … Wikipedia
Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… … Wikipedia
Computer fraud — is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines. Contents 1 Notable incidents 2 See also 3 External… … Wikipedia
Audit (disambiguation) — Audit may refer to:*Audit an evaluation of an organization, system, process, project or product * Auditor of a Student Society, especially in Ireland, having a similar etymology. *Academic audit the completion of a course of study for which no… … Wikipedia
audit software — Computer programs used by an auditor to examine an enterprise s computer files. Utility programs may be used, for example, for sorting and printing data files. Package or tailor made programs may be used to interrogate the computer based… … Accounting dictionary
audit software — Computer programs used by an auditor to examine an enterprise s computer files. Utility programs may be used, for example, for sorting and printing data files. Package or tailor made programs may be used to interrogate the computer based… … Big dictionary of business and management
Computer fraud case studies — BackgroundThe purpose of this page is to explore case studies in using Information Technology to commit fraud. Computer fraud is the act of using a computer to commit fraud (A deception deliberately practiced in order to secure unfair or unlawful … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Computer Fraud and Abuse Act — The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986, intended to reduce cracking of computer systems and to address federal computer related offenses. The Act (codified as 18 U.S.C. § 1030) governs… … Wikipedia