-
1 deliberate unauthorized access
Безопасность: преднамеренный несанкционированный доступУниверсальный англо-русский словарь > deliberate unauthorized access
-
2 deliberate unauthorized access
Англо-русский словарь по компьютерной безопасности > deliberate unauthorized access
-
3 security: Attributes of software products that bear on its ability to prevent unauthorized access, whether accidental or deliberate, to programs and data
Общая лексика: защищ (см. ISO 9126, Standard glossary of terms used in Software Testing)Универсальный англо-русский словарь > security: Attributes of software products that bear on its ability to prevent unauthorized access, whether accidental or deliberate, to programs and data
-
4 access
1) доступ (в систему обработки информации или в сеть связи)2) доступ (на защищенную территорию); способ доступа -
5 преднамеренный несанкционированный доступ
Security: deliberate unauthorized accessУниверсальный русско-английский словарь > преднамеренный несанкционированный доступ
-
6 защищ
См. также в других словарях:
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
cybercrime — also known as computer crime Any use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially… … Universalium
Parkerian Hexad — The Parkerian hexad is a set of six elements of information security proposed by Donn B. Parker. The term was coined by M. E. Kabay. The Parkerian hexad adds three additional attributes to the three classic security attributes of the CIA triad… … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Tamper resistance — is resistance to by either the normal users of a product, package, or system or others with physical access to it. There are many reasons for employing tamper resistance.Tamper resistance ranges from simple features like screws with special heads … Wikipedia
Tamper-evident — describes a device or process that makes unauthorised access to the protected object easily detected. This may take the form of seals, markings or other techniques.TamperingTampering involves the deliberate altering or adulteration of a product,… … Wikipedia
Philip Zack — Philip M. Zack, Lt. Col. (retired), Ph.D., DVM is an American microbiologist. Phil Zack worked at USAMRIID in Fort Detrick through December 1991, then at the Walter Reed Army Institute of Research, then for Eli Lilly, and then for a company in… … Wikipedia
china — /chuy neuh/, n. 1. a translucent ceramic material, biscuit fired at a high temperature, its glaze fired at a low temperature. 2. any porcelain ware. 3. plates, cups, saucers, etc., collectively. 4. figurines made of porcelain or ceramic material … Universalium
China — /chuy neuh/, n. 1. People s Republic of, a country in E Asia. 1,221,591,778; 3,691,502 sq. mi. (9,560,990 sq. km). Cap.: Beijing. 2. Republic of. Also called Nationalist China. a republic consisting mainly of the island of Taiwan off the SE coast … Universalium
Radio-frequency identification — (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from… … Wikipedia
Law, Crime, and Law Enforcement — ▪ 2006 Introduction Trials of former heads of state, U.S. Supreme Court rulings on eminent domain and the death penalty, and high profile cases against former executives of large corporations were leading legal and criminal issues in 2005.… … Universalium