-
1 integrity of information
целостность [сохранность] информацииEnglish-Russian cryptological dictionary > integrity of information
-
2 Link Integrity Verification
Information technology: LIVУниверсальный русско-английский словарь > Link Integrity Verification
-
3 Message Integrity Check / Code
Information technology: MICУниверсальный русско-английский словарь > Message Integrity Check / Code
-
4 Temporal Key Integrity Protocol
Information technology: TKIP (WEP, WLAN, WPA)Универсальный русско-английский словарь > Temporal Key Integrity Protocol
-
5 data integrity
Information technology: DI -
6 database integrity
Information technology: DIУниверсальный русско-английский словарь > database integrity
-
7 declarative referential integrity
Information technology: DRIУниверсальный русско-английский словарь > declarative referential integrity
-
8 temporal key integrity protocol
Information technology: TKIP (WEP, WLAN, WPA)Универсальный русско-английский словарь > temporal key integrity protocol
-
9 Office of Scientific Integrity
Универсальный русско-английский словарь > Office of Scientific Integrity
-
10 secure integrity of information
обеспечивать целостность информацииEnglish-Russian cryptological dictionary > secure integrity of information
-
11 целостность
Русско-английский новый политехнический словарь > целостность
-
12 cjelovitost informacija
-
13 integritet informacija
-
14 nepovredivost informacija
-
15 нарушение целостности информации
нарушение целостности информации
1. Утрата информации, при ее обработке техническими средствами, свойства целостности в результате ее несанкционированной модификации или несанкционированного уничтожения. Несанкционированная модификация информации может быть случайной (искажение) или умышленной (подделка). Таким образом, по отношению к целостности информации можно дифференцировать дополнительно следующие виды угроз: модификацию, искажение, подделку и уничтожение.
2. Искажение информации, включая ее разрушение или уничтожение.
[Домарев В.В. Безопасность информационных технологий. Системный подход.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > нарушение целостности информации
-
16 значимость информации
Русско-английский большой базовый словарь > значимость информации
-
17 информация о
-
18 потери информации
Русско-английский большой базовый словарь > потери информации
-
19 потребность в информации
Русско-английский большой базовый словарь > потребность в информации
-
20 принцип скрытой информации
Русско-английский большой базовый словарь > принцип скрытой информации
См. также в других словарях:
information integrity — noun The accuracy, consistency and reliability of the information content, processes and systems, especially with regard to database corruption … Wiktionary
Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Information integration — (II) (also called information fusion, deduplication and referential integrity) is the merging of information from disparate sources with differing conceptual, contextual and typographical representations. It is used in data mining and… … Wikipedia
Information — as a concept has a diversity of meanings, from everyday usage to technical settings. Generally speaking, the concept of information is closely related to notions of constraint, communication, control, data, form, instruction, knowledge, meaning,… … Wikipedia
Information manipulation theory — (IMT)( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992;( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , [http://comm.msu.edu/people/faculty/149 Levine] , Torres, Campbell,… … Wikipedia
Information technology audit process — Information technology audit process:Generally Accepted Auditing Standards (GAAS)In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. The standards cover the following three… … Wikipedia
Information privacy law — Information privacy laws cover the protection of information on private individuals from intentional or unintentional disclosure or misuse. The European Directive on Protection of Personal Data, released on July 25, 1995 was an attempt to unify… … Wikipedia
Information Quality Management — is an information technology (IT) management discipline, which encompasses the COBIT Information Criteria of efficiency, effectiveness, confidentiality, integrity, availability, compliance, and reliability. The idea is for companies to have the… … Wikipedia
information assurance — Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by… … Military dictionary
Information Criteria — are a core component of the COBIT Framework that describes the intent of the objectives, namely the control of:Effectiveness deals with information being relevant and pertinent to the business process as well as being delivered in a… … Wikipedia