-
1 security token service
"A Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature.) In Active Directory Federation Services (ADFS), the Federation Service is a security token service." -
2 security
[si΄kjuərəti] n անվտանգություն, ապահովություն. security of tenure վար ձե լու/ վարձույթի երաշխավորման իրավունք. security check հավատարմության ստուգում. a security risk անապահով, անվստահելի. S security Council Անվտանգության խորհուրդ (ՄԱԿ). (երաշ խավո րում) lend money on security գրավակ անով/երաշխիքով փող պարտք տալ. stand security for smb մեկին երաշխավորել. securities արժեթղթեր. listed securities գնանշված արժեթղթեր. unlisted securities չգնահատված արժեթղթեր government securities պետական արժեթղթեր -
3 security context
"The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object."سياق الأمان -
4 Security Support Provider Interface
"A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details."English-Arabic terms dictionary > Security Support Provider Interface
-
5 security descriptor
"A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited." -
6 security vulnerability
A vulnerability in a product that is addressed by a Microsoft security update and security bulletin or a service pack. -
7 security role
A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system. -
8 security group
A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group. -
9 security host
"An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server." -
10 security log
An event log containing information on security events that are specified in the audit policy. -
11 security principal
"In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources." -
12 security filtering
A method of applying the settings of a Group Policy object (GPO) based on security principals. -
13 Security Configuration Wizard
A tool that automates security best practices to reduce the attack surface for a server. The SCW was introduced with Windows Server 2003 Service Pack 1.English-Arabic terms dictionary > Security Configuration Wizard
-
14 security breach
"An event that compromises the security of a computer, application, network or other resource." -
15 security disabler
A type of Trojan that disables security settings or products such as antivirus software. -
16 security support component
"A hardware-based security facility that implements cryptosystems, random number generation, and key storage."English-Arabic terms dictionary > security support component
-
17 security association
"A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver." -
18 security-edge gateway
"A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules." -
19 Security
ضمان ، كفالة ، رهن ، ورقة مالية ، سهم -
20 Security account
US ملف أوراق مالية ، حساب أوراق مالية
См. также в других словарях:
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Security theater — consists of security countermeasures intended to provide the feeling of improved security while doing little or nothing to actually improve security. [cite book last = Schneier first = Bruce authorlink = Bruce Schneier title = Beyond Fear:… … Wikipedia
security — se·cur·i·ty /si kyu̇r ə tē/ n pl ties 1 a: something (as a mortgage or collateral) that is provided to make certain the fulfillment of an obligation used his property as security for a loan b: surety see also … Law dictionary
Security sector reform — (SSR) is a concept to reform or rebuild a state s security sector that emerged first in the 1990s in Eastern Europe. It starts where a dysfunctional security sector is unable to provide security to the state and its people effectively and under… … Wikipedia
Security controls — are safeguards or countermeasures to avoid, counteract or minimize security risks. To help review or design security controls, they can be classified by several criteria, for example according to the time that they act, relative to a security… … Wikipedia
Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… … Wikipedia
Security of person — or security of the person is a human right guaranteed by the Universal Declaration of Human Rights, adopted by the United Nations in 1948. It is also a right respected in the Constitution of Canada, the Constitution of South Africa and other laws … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Security Level Management — (SLM) ist ein Qualitätssicherungssystem für die elektronische Informationssicherheit. SLM hat zum Ziel, den IT Sicherheitsstatus jederzeit unternehmensweit transparent darzustellen und IT Sicherheit zu einer messbaren Größe zu machen. Transparenz … Deutsch Wikipedia