-
1 security-enabled workgroup
An Access workgroup in which users log on with a user name and password and in which access to database objects is restricted according to permissions granted to specific user accounts and groups.English-Arabic terms dictionary > security-enabled workgroup
-
2 network security key
A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key. -
3 interactive dialog box
"A dialog box that requires a response from the user. Intermediary devices such as a security host require such a dialog box as an added layer of security between the client and the remote access server. In such dialog boxes, the user types an access code or a user name and password on the remote access terminal screen." -
4 Net Logon service
"A user-mode service that runs in the Windows security subsystem. The Net Logon service passes the user`s credentials through a secure channel to the domain database and returns the domain security identifiers and user rights for the user. In addition, the Net Logon service performs a variety of other functions related to the user logon process, such as periodic password updates for computer accounts and domain controller discovery." -
5 authentication service
"A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer." -
6 preset-to callback
A form of security in which a remote access server verifies users by calling them back at numbers supplied by the network administrator at the time user privileges are granted. Only a network administrator can change a preset callback number. This ensures that no one can borrow a user's password and connect to the server from a location other than the user's normal one. -
7 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
8 trusted PC
A computer that a customer adds to their Windows Live account security information from which they can reset a forgotten password without providing further information. -
9 two-step verification
An optional Microsoft account sign-in method with which users can only sign in by entering both a password and a security code sent to them by the Microsoft account team.
См. также в других словарях:
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Password policy — A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization s official regulations and may be taught as part… … Wikipedia
Password length parameter — In telecommunication, a password length parameter is a basic parameter which affects password strength against brute force attack and so is a contributor to computer security. Password length parameters are related by the expression P = L imes R… … Wikipedia
Security Now! — Infobox Podcast title = Security Now! caption = host = Leo Laporte Steve Gibson url = [http://www.twit.tv/SN http://www.twit.tv/SN] rss = [http://leoville.tv/podcasts/sn.xml MP3 Feed] status = Weekly audio format = MP3 began = August 19, 2005… … Wikipedia
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
Password fatigue — describes the syndrome where people are required to remember an excessive number of passwords as part of their daily living. The increasing prominence of information technology and the Internet in employment, finance, recreation and other aspects … Wikipedia
Password notification e-mail — is a common technique used by websites. If a user forgets their password then a password notification e mail is sent containing enough information for the user to access their account again. This method of password retrieval relies on the… … Wikipedia
Password chaos — Password chaos, also known as identity chaos, is the feeling experienced by computer users who use a large amount of software applications which require authentication.An example would be a user who needs needs a password to log in to their… … Wikipedia
Password synchronization — is defined as any process or technology thathelps users to maintain a single password that is subject to a singlesecurity policy, and changes on a single schedule across multiple systems.Password synchronization is an effective mechanism for… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia