-
1 security principal
"In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources." -
2 security breach
"An event that compromises the security of a computer, application, network or other resource." -
3 security
Protection of a computer system and its data from harm or loss. -
4 security ID
"In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created."معرّف الأمان -
5 security identifier
"In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created."معرّف الأمان -
6 security file
A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk. -
7 security hole
"An unintentionally unprotected entry point into an otherwise secure computer, component, application, or other online resource." -
8 Microsoft Safety & Security Center
"The Microsoft website of information on and resources for computer security, digital privacy, and online safety."English-Arabic terms dictionary > Microsoft Safety & Security Center
-
9 Microsoft Safety and Security Center
"The Microsoft website of information on and resources for computer security, digital privacy, and online safety."English-Arabic terms dictionary > Microsoft Safety and Security Center
-
10 network security key
A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key. -
11 local group
"A security group that can be granted rights and permissions only to resources on the computer on which the group is created. Local groups can have any user accounts that are local to the computer as members, as well as users, groups, and computers from a domain to which the computer belongs." -
12 Net Logon service
"A user-mode service that runs in the Windows security subsystem. The Net Logon service passes the user`s credentials through a secure channel to the domain database and returns the domain security identifiers and user rights for the user. In addition, the Net Logon service performs a variety of other functions related to the user logon process, such as periodic password updates for computer accounts and domain controller discovery." -
13 health certificate
"An X.509 certificate that asserts the health of a client computer. Client computers can use this certificate to prove their identities and health through security services and mechanisms such as Internet Protocol security (IPsec) and Internet Key Exchange (IKE), which recognize the X.509 standard." -
14 soft SA
"A security association (SA) in which the Negotiate security filter action is enabled, but there is no authentication or encryption being performed because the computer with which communication occurs is not running IPSec." -
15 access control
"A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object." -
16 privilege
"A user's right to perform a specific task, usually one that affects an entire computer system rather than a particular object. Privileges are assigned by administrators to individual users or groups of users as part of the security settings for the computer." -
17 User Account Control
"A security feature that helps prevent unauthorized changes to a computer, by asking user for permission or administrator credentials before performing actions that could potentially affect the computer's operation or that change settings that affect multiple users." -
18 UAC
"A security feature that helps prevent unauthorized changes to a computer, by asking user for permission or administrator credentials before performing actions that could potentially affect the computer's operation or that change settings that affect multiple users." -
19 dongle
A security device connected to an input/output port to permit the use of a particular software package on that computer. The use of the hardware key hash permits backup copying of software but prevents its unlicensed use on additional computers. -
20 relative ID
The portion of a security identifier (SID) that identifies a user or group in relation to the authority that issued the SID. The authority is usually either the local computer or a domain.
- 1
- 2
См. также в других словарях:
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
computer security — the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment, namely, serial numbers, doors and… … Universalium
computer security — kompiuterių saugumas statusas T sritis informatika apibrėžtis Priemonės, leidžiančios apsaugoti kompiuterį nuo įsilaužimų ir užtikrinti jame saugomos informacijos konfidencialumą, neprieštaringumą ir prieinamumą. Didelėse sistemose, kurio saugomi … Enciklopedinis kompiuterijos žodynas
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Computer security conference — A computer security conference is a term that describes a convention for individuals involved in computer security. They generally serve as a meeting place for system and network administrators, hackers, and computer security experts. Contents 1… … Wikipedia
Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events … Wikipedia
Computer Security Institute — The Computer Security Institute (CSI) is a professional membership organization serving practitioners of information, network, and computer enabled physical security, from the level of system administrator to the chief information security… … Wikipedia
Computer security policy — A computer security policy defines the goals and elements of an organization s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical… … Wikipedia
Computer Security Act of 1987 — The Computer Security Law of 1987, Public Law No. 100 235 (H.R. 145), (Jan. 8, 1988), was passed by the United States Congress. It was passed to improve the security and privacy of sensitive information in Federal computer systems and to… … Wikipedia
Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… … Wikipedia
Computer Security Incident Response Team — Ein Computer Emergency Response Team (CERT), auch als Computer Security Incident Response Team (CSIRT) bezeichnet, ist eine Organisation oder ein spezielles Team von IT Sicherheitsfachleuten, das bei der Lösung von konkreten IT… … Deutsch Wikipedia