-
1 network security key
A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key. -
2 security-edge gateway
"A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules." -
3 security breach
"An event that compromises the security of a computer, application, network or other resource." -
4 Windows Firewall with Advanced Security
A snap-in which allows users to configure policies that provide enhanced network security for Windows computers.English-Arabic terms dictionary > Windows Firewall with Advanced Security
-
5 Windows Security Health Agent
"Windows system health agent (SHA) for Network Access Protection (NAP). Windows Security Health Agent provides status of system health components that are monitored by Windows Security Center, such as the status of Windows Firewall, antivirus applications, and Windows Update."English-Arabic terms dictionary > Windows Security Health Agent
-
6 Windows Security Health Validator
Windows system health validator (SHV) for Network Access Protection (NAP). Windows Security Health Validator verifies status of system health components that are received in a statement of health (SoH) from NAP client computers that have the Windows Security Health Agent installed.مدقق صحة أمان WindowsEnglish-Arabic terms dictionary > Windows Security Health Validator
-
7 Transport Layer Security
"A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol." -
8 Internet Protocol security
"A set of industry-standard, cryptography-based services and protocols that help to protect data over a network."English-Arabic terms dictionary > Internet Protocol security
-
9 IEEE 802.1X security standard
An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks.مواصفات الأمان القياسية IEEE 802.1XEnglish-Arabic terms dictionary > IEEE 802.1X security standard
-
10 confidentiality
"A basic security function of cryptography that ensures that only authorized users can read or use confidential or secret information. Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network traffic and intercept valuable proprietary information. For example, an Internet Protocol security service ensures that a message is disclosed only to intended recipients by encrypting the data."السرّية -
11 WSHA
"Windows system health agent (SHA) for Network Access Protection (NAP). Windows Security Health Agent provides status of system health components that are monitored by Windows Security Center, such as the status of Windows Firewall, antivirus applications, and Windows Update." -
12 WSHV
Windows system health validator (SHV) for Network Access Protection (NAP). Windows Security Health Validator verifies status of system health components that are received in a statement of health (SoH) from NAP client computers that have the Windows Security Health Agent installed. -
13 firewall
"A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules." -
14 preset-to callback
A form of security in which a remote access server verifies users by calling them back at numbers supplied by the network administrator at the time user privileges are granted. Only a network administrator can change a preset callback number. This ensures that no one can borrow a user's password and connect to the server from a location other than the user's normal one. -
15 Wi-Fi Protected Access
A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network. -
16 WPA
A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network. -
17 Access Control Server
A component of Cisco Identity Based Networking Services (IBNS) architecture that improves network access security for Cisco network devices. -
18 ACS
A component of Cisco Identity Based Networking Services (IBNS) architecture that improves network access security for Cisco network devices. -
19 audit policy
A policy that determines the security events to be reported to the network administrator. -
20 TLS
"A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol."
- 1
- 2
См. также в других словарях:
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia
Network Security Toolkit — NST WUI: Multi Tap Network Packet Capture Developer(s) … Wikipedia
Network Security & Cryptography — is a concept to protect our network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches… … Wikipedia
Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) … Wikipedia
Network security policy — A network security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document… … Wikipedia
network security — Defensive measures (hardware or software) used to impose user access restrictions on a network … IT glossary of terms, acronyms and abbreviations
TriGeo Network Security — Infobox Company company name = TriGeo Network Security company company type = Private company slogan = You can t protect what you can t see™ foundation = 2001 location city = Post Falls, Idaho location country = USA locations = 1 key people =… … Wikipedia
EC-Council Network Security Administrator — The EC Council Network Security Administrator (ENSA) is a professional certification provided by the International Council of Electronic Commerce Consultants.The Network Security Administrator is a prerequisite for the EC Council CEH… … Wikipedia
L-3 Network Security — Infobox Company type = Subsidiary of Symantec foundation = United States location = United States industry = Computers parent = SymantecL 3 Network Security is a network security company in the United States. It was acquired by Symantec on… … Wikipedia
Arkoon Network Security — Création 2000 Forme juridique Société anonyme à Directoire et Conseil de surveillance Action Euronext Alternext : ALARK … Wikipédia en Français
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia