-
21 RID
The portion of a security identifier (SID) that identifies a user or group in relation to the authority that issued the SID. The authority is usually either the local computer or a domain. -
22 principal
"In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources." -
23 high priority update
A classification used on the Windows Update web site and by the Windows Update Service to recommend Microsoft software updates and drivers that help protect against the latest publicly known security threats and reliability issues. All software updates and drivers that can be installed by turning on Automatic Updates on your computer are classified as high priority. These can also be installed by visiting the Windows Update web site. -
24 back door
A hardware or software-based hidden entrance to a computer system that can be used to bypass the system's security policies. -
25 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
26 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
27 fully trusted
Pertaining to applications or forms that have greater security permissions and complete access to the system resources and other components on a user's computer. -
28 partially trusted
Pertaining to applications or forms that have limited security permissions and access to the system resources and other components on a user's computer. -
29 BitLocker
A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components. -
30 standard account
A type of user account that allows users to install software and change system settings that do not affect other users or the security of the computer. This account type is recommended for daily use. -
31 BitLocker Drive Encryption
A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components.English-Arabic terms dictionary > BitLocker Drive Encryption
-
32 System Agent
"An agent that monitors checkpoints for potential threats making unauthorized or hazardous changes to your computer, such as altering your security permissions or system settings." -
33 backdoor
Pertaining to a type of Trojan used to bypass a computer's security policies. -
34 EdgeSync
"A collection of processes that are run on the Exchange Server 2007 Hub Transport server role to establish one-way replication of recipient and configuration information from the Active Directory directory service to the Active Directory Application Mode (ADAM) instance on a computer that has the Edge Transport server role installed. EdgeSync copies only the information that is required for the Edge Transport server to perform anti-spam and message security configuration tasks, and information about the Send connector configuration that is required to enable mail flow from the Exchange 2007 organization's Hub Transport servers to the Internet through one or more Edge Transport servers. EdgeSync performs scheduled updates so that the information in ADAM remains current." -
35 data center
"A facility used to house mission critical computer systems and associated components. It generally includes environmental controls (air conditioning, fire suppression, etc.), redundant/backup power supplies, redundant data communications connections and high security." -
36 trusted PC
A computer that a customer adds to their Windows Live account security information from which they can reset a forgotten password without providing further information.
- 1
- 2
См. также в других словарях:
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
computer security — the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment, namely, serial numbers, doors and… … Universalium
computer security — kompiuterių saugumas statusas T sritis informatika apibrėžtis Priemonės, leidžiančios apsaugoti kompiuterį nuo įsilaužimų ir užtikrinti jame saugomos informacijos konfidencialumą, neprieštaringumą ir prieinamumą. Didelėse sistemose, kurio saugomi … Enciklopedinis kompiuterijos žodynas
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Computer security conference — A computer security conference is a term that describes a convention for individuals involved in computer security. They generally serve as a meeting place for system and network administrators, hackers, and computer security experts. Contents 1… … Wikipedia
Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events … Wikipedia
Computer Security Institute — The Computer Security Institute (CSI) is a professional membership organization serving practitioners of information, network, and computer enabled physical security, from the level of system administrator to the chief information security… … Wikipedia
Computer security policy — A computer security policy defines the goals and elements of an organization s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical… … Wikipedia
Computer Security Act of 1987 — The Computer Security Law of 1987, Public Law No. 100 235 (H.R. 145), (Jan. 8, 1988), was passed by the United States Congress. It was passed to improve the security and privacy of sensitive information in Federal computer systems and to… … Wikipedia
Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… … Wikipedia
Computer Security Incident Response Team — Ein Computer Emergency Response Team (CERT), auch als Computer Security Incident Response Team (CSIRT) bezeichnet, ist eine Organisation oder ein spezielles Team von IT Sicherheitsfachleuten, das bei der Lösung von konkreten IT… … Deutsch Wikipedia