-
1 cybercrime defenses
-
2 информационная безопасность
1) Information technology: IT securityУниверсальный русско-английский словарь > информационная безопасность
-
3 кибербезопасность
-
4 система защиты от кибератак
Универсальный русско-английский словарь > система защиты от кибератак
-
5 система защиты от киберпреступности
Универсальный русско-английский словарь > система защиты от киберпреступности
См. также в других словарях:
cybercrime — also known as computer crime Any use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially… … Universalium
Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Cyberwarfare — Cyberwar redirects here. For the video game, see Cyberwar (video game). For the 2004 movie, see Cyber Wars (film). For the 1999 MMOG, see Cyber Wars. Computer security Secure operating systems Security architecture Security by design … Wikipedia
Digital Millennium Copyright Act — Full title To amend title 17, United States Code, to implement the World Intellectual Property Organization Copyright Treaty and Performances and Phonograms Treaty, and for other purposes. Acronym DMCA Enacted by the … Wikipedia
Anti-pedophile activism — encompasses opposition to the following: pedophiles, pro pedophile activism, and other phenomena that are commonly seen as related to pedophilia, such as child pornography and child sexual abuse. [ [http://www.bbc.co.uk/worldservice/programmes/glo… … Wikipedia
NCIS (season 6) — NCIS season 6 DVD cover Country of origin United States … Wikipedia
Storm botnet — The typical lifecycle of spam that originates from a botnet: (1) Spammer s web site (2) Spammer (3) Spamware (4) Infected computers (5) Virus or trojan (6) Mail servers (7) Users (8) Web traffic The Storm… … Wikipedia
Denial-of-service attack — DoS redirects here. For other uses, see DOS (disambiguation). DDoS Stacheldraht Attack diagram. A denial of service attack (DoS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to … Wikipedia
Proactive Cyber Defence — means acting in anticipation to oppose an attack against computers and networks. It represents the dynamic between purely offensive and defensive action; interdicting and disrupting an attack or a threat’s preparation to attack, either pre… … Wikipedia
Law, Crime, and Law Enforcement — ▪ 2006 Introduction Trials of former heads of state, U.S. Supreme Court rulings on eminent domain and the death penalty, and high profile cases against former executives of large corporations were leading legal and criminal issues in 2005.… … Universalium