-
1 cryptographic traffic
Безопасность: обмен шифрованными сообщениями, шифропереписка -
2 cryptographic traffic
обмен шифрованными сообщениями; шифроперепискаАнгло-русский словарь по компьютерной безопасности > cryptographic traffic
-
3 traffic
трафик; информационный обменАнгло-русский словарь по компьютерной безопасности > traffic
-
4 system
1) система || системный3) вчт операционная система; программа-супервизор5) вчт большая программа6) метод; способ; алгоритм•system halted — "система остановлена" ( экранное сообщение об остановке компьютера при наличии серьёзной ошибки)
- CPsystem- H-system- h-system- hydrogen-air/lead battery hybrid system- Ksystem- Lsystem- L*a*b* system- master/slave computer system- p-system- y-system- Δ-system -
5 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
6 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
7 center
центр; пункт; пост; узел; середина; научпо-иселсдовагсльскпй центр, НИЦ; выводить на середину; арт. корректировать; центрировать;air C3 center — центр руководства, управления и связи ВВС
general supply (commodity) center — центр [пункт] снабжения предметами общего предназначения
hard launch (operations) control center — ркт. центр [пункт] управления пуском, защищенный от (поражающих факторов) ЯВ
launch (operations) control center — ркт. пункт управления стартового комплекса [пуском ракет]
tactical fighter weapons (employment development) center — центр разработки способов боевого применения оружия истребителей ТА
— all-sources intelligence center— C center— combat control center— educational center— logistical operations center— logistics services center— operational center— secured communications center— skill development center -
8 security
боевое обеспечение; охранение; защита; сохранение тайны; обеспечение секретности; безопасность; служба безопасности, контрразведка; охрана общественного порядка -
9 section
секция; отдел, отделение; расчет; участок; сечение; профиль; разрез; часть; звено; отсек; орудие; ( авиационный) отрядair movement (traffic) section — Бр. отделение воздушных перевозок
collection, identification and evacuation section — секция сбора, опознания и эвакуации раненых и убитых
works section, RE — Бр. инженерно-строительная секция
— ammunition supply section— cable-laying section— chemical warfare section— countermortar radar section— launching section— light armor section* * *• секция -
10 intercept
перехват (информации) перехват (информации)- audio intercept- changed-address intercept- communication intercept- covert intercept- cryptographic intercept- electromagnetic emanation intercept- electronic intercept- identity intercept- illicit intercept- induction intercept- message intercept- passive intercept- passive information intercept- third-party intercept- traffic intercept- voice interceptАнгло-русский словарь по компьютерной безопасности > intercept
-
11 interception
перехват (информации)- audio interception- changed-address interception- communication interception- covert interception- cryptographic interception- electromagnetic emanation interception- electronic interception- identity interception- illicit interception- induction interception- message interception- passive interception- passive information interception- third-party interception- traffic interception- voice interceptionАнгло-русский словарь по компьютерной безопасности > interception
-
12 service
служба; сервис, обслуживание; услугиАнгло-русский словарь по компьютерной безопасности > service
-
13 security
1) защита; защищённость, безопасностьсвойства ПО и аппаратного обеспечения, обеспечивающие предотвращение несанкционированного доступа (случайного или намеренного) к программам и даннымсм. тж. A1 security, access control, authorization, communication security, computer security, content security software, crimeware, cryptographic security, data security, emission security, information security, Internet security, login security, network security, physical security, proactive security, security administrator, security agent security architecture, security audit, security breach, security certification, security context, security erase, security evaluation, security hole, security kernel, security log, security management, security model, security patch, security perimeter, security policy, security protocol, security scanner, security service, security solution, security technology, security testing, security threat, security tools, security vulnerability, traffic-flow security, transmission security, Web securityсм. тж. security audit, security certification, security management, security policy, wireless security3) секретность, конфиденциальность, защищённость"Neither the first Ethernet local area network nor the first Internet computer networks were built with privacy or security in mind" (Т. Shimomura). — При разработке как первой локальной сети Ethernet, так и первых компьютерных сетей Интернета о проблемах защищённости персональных данных и безопасности практически не думали
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > security
См. также в других словарях:
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Traffic analysis — is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia
List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… … Wikipedia
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
IPsec — Internet Protocol Security (IPsec) is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each in a data stream. IPsec also includes protocols for cryptographic key establishment.… … Wikipedia
Pearl Harbor advance-knowledge debate — The Pearl Harbor advance knowledge debate is a dispute over what, if any, advance knowledge American officials had of Japan s December 7, 1941 attack on Pearl Harbor.Ever since the Japanese attack there has been debate as to how and why the… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia