-
1 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
2 secure note
"Any information (e.g. account numbers, sensitive data, etc.) with a title and some free-form text that can be stored in a secure manner in a personal vault." -
3 Secure Hash Algorithm 1
"An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places." -
4 FTPS
An extension to the File Transfer Protocol (FTP) that supplies secure data communication through data encryption and decryption. -
5 FTP over SSL
An extension to the File Transfer Protocol (FTP) that supplies secure data communication through data encryption and decryption. -
6 ar-sa عامل تصفية
"The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation." -
7 cryptography
"The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation." -
8 firewall traversal
"A technology that provides secure pathways through a firewall and enables multiple data streams to pass thru the firewall on the same port (e.g., audio and video data on the same port)." -
9 XML Signature
An XML-based digital signature that can be used to secure the data contained in XML documents. XML Signatures are a standard governed by the World Wide Web Consortium (W3C). -
10 Digital Signature Standard
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption.English-Arabic terms dictionary > Digital Signature Standard
-
11 DSS
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption. -
12 keying material
"The PIN, keys, base prime numbers or other data used in encryption to establish and maintain secure communication." -
13 Target Application
An item stored in the Secure Store Service that maps users or groups to credentials needed to access external data or other resources. -
14 permission
One or more securable object permissions that secure access to logical units of application data and functionality. -
15 NFC reader
"An external device that interacts with an NFC-enabled phone. These devices exchange data, such as contact details or secure payment information, with NFC-enabled phones through contactless communication."
См. также в других словарях:
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
Secure electronic transaction — (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is not itself a payment system, but rather a set of security protocols and formats that enables users to employ the… … Wikipedia
Data Shredder — Developer(s) CBL Datenrettung Stable release 1.0.1 / April 3, 2007; 4 years ago (2007 04 03) Operating system Windows, MS DOS x86 … Wikipedia
data protection — Under the Data Protection Act 1984, those holding personal data on computer (where the data relates to identifiable individuals) must observe certain principles in how the data is held and in respect of the collection, holding, disclosure, use… … Law dictionary
Data Fellows Corporation — F Secure Corporation Unternehmensform AG Gründung 1988 Unternehmenssitz … Deutsch Wikipedia
Secure channel — In cryptography, a secure channel is a way of transferring data that is resistant to interception and tampering.A confidential channel is a way of transferring data that is resistant to interception, but not necessarily resistant to tampering.An… … Wikipedia
Data center — An operation engineer overseeing a Network Operations Control Room of a data center. A data center (or data centre or datacentre or datacenter) is a facility used to house computer systems and associated components, such as telecommunications and … Wikipedia
Data haven — A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data.[1][2][3] Data havens are locations with legal environments that are friendly to the concept of a computer network freely holding data and even… … Wikipedia
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
Data remanence — is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that… … Wikipedia
Secure Shell — or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. RFC 4252] Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET… … Wikipedia