-
1 security descriptor
"A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited." -
2 data center
"A facility used to house mission critical computer systems and associated components. It generally includes environmental controls (air conditioning, fire suppression, etc.), redundant/backup power supplies, redundant data communications connections and high security." -
3 security
Protection of a computer system and its data from harm or loss. -
4 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
5 imperative security check
"A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method." -
6 Internet Protocol security
"A set of industry-standard, cryptography-based services and protocols that help to protect data over a network."English-Arabic terms dictionary > Internet Protocol security
-
7 RSA
"A public-key encryption standard for Internet security. It is the default cryptographic service provider (CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977. This acronym derives from the last names of the inventors of the technology: Rivest, Shamir, and Adleman." -
8 compliance
"Meeting an organization's various obligations, which may arise from laws, regulations, rules, and many other legal instruments, such as court judgments, litigation, and even contracts. Specific and important examples of these obligations include the Sarbanes-Oxley Act (SOX) and the California Law on Notice of Security Breach, formerly known as SB-1386. These regulatory obligations may be created by many sources, such as national and local governments and from industry-specific oversight groups, such as the Payment Card Industry Data Security Standards." -
9 PKCS #7
"The Cryptographic Message Syntax Standard. It is a general syntax, developed and maintained by RSA Data Security, Inc., for data to which cryptography may be applied, such as digital signatures and encryption. It also provides a syntax for disseminating certificates or certificate revocation lists."PKCS#7 -
10 PKCS #10
"The Certification Request Syntax Standard, developed and maintained by RSA Data Security, Inc. A syntax for certificate requests."PKCS#10 -
11 PKCS #12
"Personal Information Exchange Syntax Standard, developed and maintained by RSA Data Security, Inc. This standard primarily provides a format for storing keys or a certificate in a file."PKCS#12 -
12 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
13 MD5
"An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication." -
14 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
15 SSL
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
16 key
"In IP security (IPSec), a value used in combination with an algorithm to encrypt or decrypt data. Key settings for IPSec are configurable to provide greater security." -
17 confidentiality
"A basic security function of cryptography that ensures that only authorized users can read or use confidential or secret information. Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network traffic and intercept valuable proprietary information. For example, an Internet Protocol security service ensures that a message is disclosed only to intended recipients by encrypting the data."السرّية -
18 seal
"To store data in such a way that it can be retrieved later by the same security support component, and only by that security support component." -
19 access token
"A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority." -
20 Safe Harbor Principles
"Seven principles agreed to by the United States and the European Union for the transfer of PII from the European Union to the United States, which a company must adhere to if it registers for Safe Harbor. The seven principles are categorized into the following subjects: (1) Notice; (2) Choice; (3) Access; (4) Onward Transfer; (5) Security; (6) Data Integrity; and (7) Enforcement."
- 1
- 2
См. также в других словарях:
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
data security — duomenų saugumas statusas T sritis radioelektronika atitikmenys: angl. data security vok. Datensicherheit, f rus. защищённость данных, f pranc. sécurité de données, f … Radioelektronikos terminų žodynas
Payment Card Industry Data Security Standard — The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e purse, ATM, and POS cards. Defined by the Payment Card… … Wikipedia
Payment Card Industry Data Security Standard — Der Payment Card Industry Data Security Standard, üblicherweise abgekürzt mit PCI, ist ein Regelwerk im Zahlungsverkehr, das sich auf die Abwicklung von Kreditkartentransaktionen bezieht und von allen wichtigen Kreditkartenorganisationen… … Deutsch Wikipedia
RSA Data Security — A leading publisher of encryption software, founded by mathematicians Ron Rivest, Adi Shamir, and Len Adleman. The company holds patents on several important encryption schemes and provides encryption and security consulting services.… … Dictionary of networking
VASCO Data Security International — VASCO Data Security International, Inc. (NASDAQ : VRSN), est une société américaino suisse qui conçoit et vend des systèmes matériels et logiciels de sécurité assurant un accès sécurisé aux données. Ses produits brevetés destinés au… … Wikipédia en Français
Data remanence — is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that… … Wikipedia
Data erasure — (also called data clearing or data wiping) is a software based method of overwriting data that completely destroys all electronic data residing on a hard disk drive or other digital media. Permanent data erasure goes beyond basic file deletion… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Security breach notification laws — have been enacted in most U.S. states since 2002. These laws were enacted in response to an escalating number of breaches of consumer databases containing personally identifiable information.[1] The first such law, the California data security… … Wikipedia
Security Breach Notification Laws — have been enacted in most U.S. states since 2002. These laws were enacted in response to an escalating number of breaches of consumer databases containing personally identifiable information. [ [http://www.ncsl.org/programs/lis/cip/priv/breach.htm… … Wikipedia