Перевод: с английского на арабский

с арабского на английский

information+security

  • 1 security descriptor

    "A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited."

    English-Arabic terms dictionary > security descriptor

  • 2 security context

    "The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object."
    ‏سياق الأمان

    English-Arabic terms dictionary > security context

  • 3 security log

    An event log containing information on security events that are specified in the audit policy.

    English-Arabic terms dictionary > security log

  • 4 network security key

    A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key.

    English-Arabic terms dictionary > network security key

  • 5 absolute security descriptor

    A security descriptor structure that contains pointers to the security information associated with an object.

    English-Arabic terms dictionary > absolute security descriptor

  • 6 declarative security check

    "Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on."

    English-Arabic terms dictionary > declarative security check

  • 7 personally identifiable information

    "Any information relating to a living individual who can be identified from that information. Such information may include name, country/region, street address, e-mail address, credit card number, social security number, government ID number, IP address, or any unique identifier that is associated with PII in another system."

    English-Arabic terms dictionary > personally identifiable information

  • 8 enhanced security

    "A security type that helps prevent unauthorized persons from discerning that a user is going to the Windows Live sign-in page. Otherwise, an unauthorized person might be able to intercept and manipulate the code on the sign-in page, which could result in user information being transmitted to an unauthorized website."

    English-Arabic terms dictionary > enhanced security

  • 9 Microsoft Safety & Security Center

    "The Microsoft website of information on and resources for computer security, digital privacy, and online safety."

    English-Arabic terms dictionary > Microsoft Safety & Security Center

  • 10 Microsoft Safety and Security Center

    "The Microsoft website of information on and resources for computer security, digital privacy, and online safety."

    English-Arabic terms dictionary > Microsoft Safety and Security Center

  • 11 mail-enabled universal security group

    "A group of recipients that are created to expedite the mass e-mailing of messages and other information. Unlike a mail-enabled universal distribution group, a mail-enabled USG can also be used to assign permissions. When e-mail is sent to a mail-enabled USG, all members of that group receive a copy of the message."

    English-Arabic terms dictionary > mail-enabled universal security group

  • 12 confidentiality

    "A basic security function of cryptography that ensures that only authorized users can read or use confidential or secret information. Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network traffic and intercept valuable proprietary information. For example, an Internet Protocol security service ensures that a message is disclosed only to intended recipients by encrypting the data."
    السرّية

    English-Arabic terms dictionary > confidentiality

  • 13 EdgeSync

    "A collection of processes that are run on the Exchange Server 2007 Hub Transport server role to establish one-way replication of recipient and configuration information from the Active Directory directory service to the Active Directory Application Mode (ADAM) instance on a computer that has the Edge Transport server role installed. EdgeSync copies only the information that is required for the Edge Transport server to perform anti-spam and message security configuration tasks, and information about the Send connector configuration that is required to enable mail flow from the Exchange 2007 organization's Hub Transport servers to the Internet through one or more Edge Transport servers. EdgeSync performs scheduled updates so that the information in ADAM remains current."

    English-Arabic terms dictionary > EdgeSync

  • 14 update rollup

    "A tested, cumulative set of hotfixes, security updates, critical updates, and updates packaged together for easy deployment. A rollup generally targets a specific area, such as security, or component of a product, such as Microsoft Internet Information Services (IIS)."

    English-Arabic terms dictionary > update rollup

  • 15 Event Viewer

    "A component you can use to view and manage event logs, gather information about hardware and software problems, and monitor security events. Event Viewer maintains logs about program, security, and system events."

    English-Arabic terms dictionary > Event Viewer

  • 16 impersonation token

    "An access token that captures the security information of a client process, allowing a service to ""impersonate"" the client process in security operations."

    English-Arabic terms dictionary > impersonation token

  • 17 S/MIME receipt

    An e-mail security feature used to request confirmation that a message was received unaltered and information about who opened the message and when it was opened. This verification information is returned as a message to your Inbox.
    إيصال S/MIME

    English-Arabic terms dictionary > S/MIME receipt

  • 18 trusted PC

    A computer that a customer adds to their Windows Live account security information from which they can reset a forgotten password without providing further information.

    English-Arabic terms dictionary > trusted PC

  • 19 access token

    "A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority."

    English-Arabic terms dictionary > access token

  • 20 authentication service

    "A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer."

    English-Arabic terms dictionary > authentication service

См. также в других словарях:

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • information security — The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those… …   Military dictionary

  • Information security professionalism — is the set of knowledge that people working in Information security and similar fields (Information Assurance and Computer security) should have and eventually demonstrate through certifications from well respected organizations. It also… …   Wikipedia

  • Information security policies — are a special type of documented business rule for protecting information and the systems which store and process the information. Information security policies are usually documented in one or more information security policy documents. Within… …   Wikipedia

  • Information Security Governance — Information Security Governance, Information Security Governance or ISG, is a subset discipline of Corporate Governance focused on information Security systems and their performance and risk management. Applicable Frameworks *… …   Wikipedia

  • Information Security Management — Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Information security management (ISM) are controls that… …   Wikipedia

  • Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… …   Wikipedia

  • Information Security Oversight Office — The Information Security Oversight Office (ISOO) is responsible to the President of the United States for policy and oversight of the Government wide security classification system and the National Industrial Security Program. Its authority… …   Wikipedia

  • Information Security Awareness Forum — The Information Security Awareness Forum was founded by the UK chapter of the Information Systems Security Association in 2008. Its objective is to create a co ordinated cross industry / cross institution approach for delivering security… …   Wikipedia

  • Information security management system — An Information Security Management System (ISMS) is, as the name suggests, a set of policies concerned with information security management. The idiom arises primarily out of ISO/IEC 27001.The key concept of ISMS is for an organization to design …   Wikipedia

  • Information Security Forum — The Information Security Forum (ISF) is an international, independent, not for profit organization dedicated to benchmarking and best practices in information security. It was established in 1989 as the European Security Forum but expanded its… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»