-
1 matrix analysis of insider threat
Engineering: MAITУниверсальный русско-английский словарь > matrix analysis of insider threat
-
2 угроза безопасности АЭС со стороны персонала
угроза безопасности АЭС со стороны персонала
угроза безопасности АЭС изнутри
—
[А.С.Гольдберг. Англо-русский энергетический словарь. 2006 г.]Тематики
Синонимы
EN
Русско-английский словарь нормативно-технической терминологии > угроза безопасности АЭС со стороны персонала
-
3 предотвращение внутренних угроз
предотвращение внутренних угроз
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > предотвращение внутренних угроз
-
4 внутренняя угроза
2) Foreign Ministry: internal threat -
5 внутрисистемная угроза
Универсальный русско-английский словарь > внутрисистемная угроза
-
6 матричный анализ угрозы от сотрудника организации
Engineering: matrix analysis of insider threatУниверсальный русско-английский словарь > матричный анализ угрозы от сотрудника организации
См. также в других словарях:
Threat (film) — Infobox Film name = Threat caption = DVD box. Designed by Robert Anthony Jr. Photos: James Dimaculangan, Jason Rose. imdb id = 0410757 writer = Matt Pizzolo, Katie Nisa starring = Carlos Puga, Keith Middleton, Rebekka Takamizu, Katie Nisa,… … Wikipedia
Institute for Information Infrastructure Protection — Infobox Non profit Non profit name = The Institute for Information Infrastructure Protection Non profit Non profit type = founded date = 2001 founder = location = Dartmouth College, Hanover, NH, USA origins = key people = Martin N. Wybourne, I3P… … Wikipedia
Counter-intelligence — This article is a subset article of intelligence cycle security. National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process… … Wikipedia
Counterintelligence — This article is a subset article of intelligence cycle security. Counterintelligence or counter intelligence (see spelling differences) (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence… … Wikipedia
Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… … Wikipedia
Misuse case — Example of the Misuse case principle, which could be used in thinking about capturing security requirements. Misuse Case is a business process modeling tool used in the software development business. The term Misuse case or mis use case has… … Wikipedia
DHS Science and Technology Command, Control, and Interoperability Division — According to the DHS S T website[1], the Command, Control, and Interoperability Division of Homeland Security Science and Technology develops interoperable communication standards and protocols for emergency responders, cyber security tools for… … Wikipedia
Greg Hoglund — is a well known member of the security community including the Black Hat Society and a published author on the subject of computer security and computer hacking. He is, among other things, the author of Exploiting Online Games.Hoglund has… … Wikipedia
war texting — pp. Using text messages to break into a remote system such as an automobile or a GPS tracking device. Also: war texting, wartexting. war texter n. Example Citations: Researchers at iSec Partners, a cybersecurity consultancy, have shown how a car… … New words
предотвращение внутренних угроз — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN insider threat preventionitp … Справочник технического переводчика
угроза безопасности АЭС со стороны персонала — угроза безопасности АЭС изнутри — [А.С.Гольдберг. Англо русский энергетический словарь. 2006 г.] Тематики энергетика в целом Синонимы угроза безопасности АЭС изнутри EN insider threat … Справочник технического переводчика