-
1 password-based user ID
Англо-русский словарь по компьютерной безопасности > password-based user ID
-
2 password-based user identification
Безопасность: идентификация пользователя по (введённому) паролюУниверсальный англо-русский словарь > password-based user identification
-
3 password-based user identification
Англо-русский словарь по компьютерной безопасности > password-based user identification
-
4 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
5 ID
1) (identifier) идентификатор, персональная идентифицирующая информация; устройство или прибор идентификации, идентификатор- data ID- key ID- login ID- logon ID- token ID- user ID- voice ID- wrong ID2) (identity) идентифицировать; опознавать; отождествлять3) (identification) идентификация; опозна (ва)ние, распознавание; отождествление -
6 identification
идентификация; опозна (ва)ние, распознавание; отождествлениеАнгло-русский словарь по компьютерной безопасности > identification
-
7 access
1) доступ (в систему обработки информации или в сеть связи)2) доступ (на защищенную территорию); способ доступа -
8 authentication
аутентификация, установление подлинности (идентичности) (личности, документа, объекта), отождествлениеАнгло-русский словарь по компьютерной безопасности > authentication
-
9 authentication
аутентификация, опознавание, проверка (подтверждение) подлинности1) в системе компьютерной безопасности - процесс, позволяющий установить, что пользователь или компьютер (сервер), пытающийся получить интерактивный доступ к определённой категории информации, компьютерной системе, вычислительной сети или электронной почте, действительно тот, за кого себя выдаёт. Выполняется с помощью дополнительных идентификаторов - биометрической информации, паролей, специальных карточек, цифровой подписи и др. В компьютерной системе пользователю обычно присваивается символическое имя или идентификационный код (SID), используемые в дальнейшем процедурами управления доступом (см. access control); аутентификация отличается от авторизации (authorization) тем, что не управляет предоставлением или непредоставлением права доступа к ресурсамсм. тж. authentication algorithm, authentication alias, authentication center, authentication data, authentication device, authentication level, authentication method, authentication password, authentication service, authentication token, authentication type, mutual authentication, PAP, password-based authentication, user authentication2) установление подлинности сообщения, источника (data origin authentication) и/или приёмника данныхАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > authentication
-
10 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
11 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
12 management
(административное) управление; руководствоАнгло-русский словарь по компьютерной безопасности > management
-
13 protocol
- analog networking protocol - cache coherence protocol
- card isolation protocol - character count protocol - cryptographic protocol
- data compression protocol - digital voice messaging networking protocol - error-correction protocol - interior gateway protocol
- interior gateway routing protocol
- internal message protocol
- Internet protocol
- internet protocol
- Internet control message protocol
- internet control message protocol
- Internet gateway routing protocol - IP multicast protocol - link access protocol-digital
- link access protocol for modems - packetized ensemble protocol
- password authentication protocol
- point to point protocol
- point to point multi-link protocol
- point to point tunneling protocol - routing information protocol
- SCSI interlocked protocol - session protocol
- session initiation protocol - stated protocol
- stateful protocol
- stateless protocol
- synchronous protocol - transmission control protocol - transport protocol
- transport protocol class 0
- transport protocol class 4 -
14 protocol
- analog networking protocol
- AppleTalk remote access protocol
- autonomous virtual network protocol
- bandwidth allocation control protocol
- bit-oriented protocol
- bootstrap protocol
- border gateway protocol
- byte-oriented protocol
- cache coherence protocol
- card isolation protocol
- challenge handshake authentication protocol
- character count protocol
- character-controlled protocol
- character-oriented protocol
- client-to-client protocol
- common management information protocol
- communications protocol
- compressed serial line Internet protocol
- connectionless network layer protocol
- connectionless network protocol
- connectionless protocol
- connectionless transport protocol
- connection-oriented protocol
- cryptographic protocol
- data compression protocol
- data link control protocol
- digital data communication message protocol
- digital networking protocol
- digital voice messaging networking protocol
- directory access protocol
- distance vector multicast routing protocol
- dynamic host configuration protocol
- dynamic serial line Internet protocol
- end system to intermediate system protocol
- error-correction protocol
- extended simple mail transfer protocol
- exterior gateway protocol
- fiber channel protocol
- file transfer protocol
- flexible wide-area protocol
- generic packetized protocol
- hot standby router protocol
- hypertext transfer protocol
- image access protocol
- interior gateway protocol
- interior gateway routing protocol
- internal message protocol
- Internet control message protocol
- internet control message protocol
- Internet gateway routing protocol
- Internet group management protocol
- internet group management protocol
- internet inter-ORB protocol
- Internet mail access protocol
- Internet protocol
- internet protocol
- Internet relay chat protocol
- interworking protocol
- IP multicast protocol
- layer-2 tunneling protocol
- lightweight directory access protocol
- link access protocol for modems
- link access protocol
- link access protocol-balanced
- link access protocol-digital
- link control protocol
- manufacturing automation protocol
- medium access control protocol
- message transport protocol
- Microcom networking protocol
- modulation protocol
- multicast file transfer protocol
- multi-link access protocol-digital
- multiprotocol gateway control protocol
- multi-vendor integration protocol
- NetWare core protocol
- NetWare link service protocol
- network control protocols
- network news transfer protocol
- network service protocol
- network time protocol
- next-hop routing protocol
- nonroutable protocol
- packetized ensemble protocol
- password authentication protocol
- point to point multi-link protocol
- point to point protocol
- point to point tunneling protocol
- post office protocol
- proprietary protocol
- proxy address resolution protocol
- radio link protocol
- random-access protocol
- real-time control protocol
- real-time streaming protocol
- real-time transport protocol
- resource reservation protocol
- reverse address resolution protocol
- Rock Ridge interchange protocol
- routable protocol
- router discovery protocol
- routing information protocol
- routing protocol
- SCSI interlocked protocol
- secure hypertext transfer protocol
- serial bus protocol
- serial line access protocol
- serial line Internet protocol
- service advertising protocol
- session initiation protocol
- session protocol
- simple gateway management protocol
- simple mail transfer protocol
- simple management protocol
- simple network management protocol
- socket protocol
- stated protocol
- stateful protocol
- stateless protocol
- synchronous protocol
- system use shared protocol
- technical/office protocol
- time-triggered protocol
- track protocol
- transmission control protocol Internet protocol
- transmission control protocol over/based on Internet protocol
- transmission control protocol
- transport layer protocol
- transport protocol class 0
- transport protocol class 4
- transport protocol
- upper layer protocol
- user datagram protocol
- voice over Internet protocol
- voice-channel protocol
- wireless application protocolThe New English-Russian Dictionary of Radio-electronics > protocol
См. также в других словарях:
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Password-authenticated key agreement — In cryptography, a password authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party s knowledge of a password. Contents 1 Types 2 Brief history 3 See also … Wikipedia
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Password synchronization — is defined as any process or technology thathelps users to maintain a single password that is subject to a singlesecurity policy, and changes on a single schedule across multiple systems.Password synchronization is an effective mechanism for… … Wikipedia
Password manager — A password manager is software that helps a user organize passwords and PIN codes. The software typically has a local database or a file that holds the encrypted password data for secure logon onto computers, networks, web sites and application… … Wikipedia
Password (video games) — In many video games of the 8 and 16 bit eras, after a level was beaten and/or when all continues were used, the game would display a password, that when entered in the game would allow the player to return back to this part in the game. This way … Wikipedia
User error — A user error is an error made by the human user of a complex system, usually a computer system, in interacting with it. Although the term is sometimes used by Human Computer Interaction practitioners, the more formal human error term is used in… … Wikipedia
User (computing) — Username redirects here. For the same term in Wikipedia, see Wikipedia:Username End user (computer science) redirects here. For other uses, see End user (disambiguation). A user is an agent, either a human agent (end user) or software agent, who… … Wikipedia
One-time password — A one time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs … Wikipedia
Time-based One-time Password Algorithm — TOTP (Time based One Time Password Algorithm, RFC 6238.) OATH алгоритм создания одноразовых паролей для защищенной аутентификации, являющийся улучшением HOTP (HMAC Based One Time Password Algorithm). Является алгоритмом односторонней… … Википедия