-
1 malicious insider
Безопасность: внутренний злоумышленник -
2 malicious insider
Англо-русский словарь по компьютерной безопасности > malicious insider
-
3 insider
штатный сотрудник; хорошо осведомленный сотрудник; внутренний нарушительАнгло-русский словарь по компьютерной безопасности > insider
-
4 insider
ИБ - сотрудник компании, через которого происходит утечка конфиденциальной информации (confidential information). Например, malicious insider - злонамеренный инсайдер; well-meaning insider - инсайдер, действующий из лучших побужденийсм. тж. data breachАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > insider
-
5 threat
угроза; потенциально возможное неблагоприятное воздействие
См. также в других словарях:
Multi Party Authorization — (MPA) is a process to protect a telecommunications network, data center or industrial control system from undesirable acts by a malicious insider or inexperienced technician acting alone. MPA requires that a second authorized user approve an… … Wikipedia
Encrypting File System — The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS[1] that provides filesystem level encryption. The technology enables files to be transparently encrypted to protect confidential data from… … Wikipedia
White-box testing — (also known as clear box testing, glass box testing, transparent box testing, and structural testing) is a method of testing software that tests internal structures or workings of an application, as opposed to its functionality (i.e. black box… … Wikipedia
Distributed firewall — A firewall is system or group of system (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect inside network from outside network. It may be a hardware device or a software… … Wikipedia
Organized crime — Crime syndicate redirects here. For the DC Comics group of villains, see Crime Syndicate. For other uses, see Organized crime (disambiguation). Al Capone, a name often associated with organized crime … Wikipedia
Clare Rewcastle Brown — is a British investigative journalist. Born in the Malaysian state of Sarawak, she is the founder of Sarawak Report and Radio Free Sarawak which are openly critical of the Barisan Nasional led state government of Sarawak. Contents 1 Early life,… … Wikipedia
Storm botnet — The typical lifecycle of spam that originates from a botnet: (1) Spammer s web site (2) Spammer (3) Spamware (4) Infected computers (5) Virus or trojan (6) Mail servers (7) Users (8) Web traffic The Storm… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Public image of Sarah Palin — Sarah Palin waves to delegates during her vice presidential nomination acceptance speech at the 2008 Republican National Convention … Wikipedia
Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… … Wikipedia
Abuse — This article is about the mistreatment of people or systems. For other uses, see Abuse (disambiguation). Mistreat redirects here. For other uses, see Mistreat (disambiguation). Contents 1 Types and contexts of abuse 1.1 … Wikipedia