-
1 security property matrix
Безопасность: матрица параметров безопасностиУниверсальный англо-русский словарь > security property matrix
-
2 security property matrix
Англо-русский словарь по компьютерной безопасности > security property matrix
-
3 matrix
См. также в других словарях:
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Corporate Security — identifies and effectively mitigates or manages, at an early stage, any developments that may threaten the resilience and continued survival of a corporation. It is a well organized corporate function that oversees and manages the close… … Wikipedia
Corporate security — identifies and effectively mitigates or manages, at an early stage, any developments that may threaten the resilience and continued survival of a corporation. It is a corporate function that oversees and manages the close coordination of all… … Wikipedia
Bell-LaPadula model — The Bell LaPadula Model is a state machine model used for enforcing access control in government and military applications. [cite book|last=Hansche|first=Susan|coauthors=John Berti, Chris Hare|title=Official (ISC)2 Guide to the CISSP… … Wikipedia
Bell–LaPadula model — The Bell LaPadula Model (abbreviated BLP) is a state machine model used for enforcing access control in government and military applications.[1] It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong guidance from… … Wikipedia
Bell-LaPadula-Sicherheitsmodell — Das Bell LaPadula Sicherheitsmodell schützt die Vertraulichkeit von Informationen mittels eines Systems durchgesetzter Regeln. Es setzt somit das Konzept Mandatory Access Control der Systemsicherheit um. Es soll nicht möglich sein, Informationen… … Deutsch Wikipedia
Business and Industry Review — ▪ 1999 Introduction Overview Annual Average Rates of Growth of Manufacturing Output, 1980 97, Table Pattern of Output, 1994 97, Table Index Numbers of Production, Employment, and Productivity in Manufacturing Industries, Table (For Annual… … Universalium
biblical literature — Introduction four bodies of written works: the Old Testament writings according to the Hebrew canon; intertestamental works, including the Old Testament Apocrypha; the New Testament writings; and the New Testament Apocrypha. The Old… … Universalium
Government procurement in the United States — is based on many of the same principles as commercial contracting, but is subject to special laws and regulation as described below. Persons entering into commercial contracts are pretty much free to do anything that they can agree on. Each… … Wikipedia
Dodd–Frank Wall Street Reform and Consumer Protection Act — Full title An Act to promote the financial stability of the United States by improving accountability and transparency in the financial system, to end too big to fail , to protect the American taxpayer by ending bailouts, to protect consumers… … Wikipedia