-
1 key
"In IP security (IPSec), a value used in combination with an algorithm to encrypt or decrypt data. Key settings for IPSec are configurable to provide greater security." -
2 security support component
"A hardware-based security facility that implements cryptosystems, random number generation, and key storage."English-Arabic terms dictionary > security support component
-
3 network security key
A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key. -
4 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
5 Internet Key Exchange
A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec). -
6 Pairwise Master Key
A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process. -
7 master secret
A security key generated by the master secret server when an Enterprise Single Sign-On (SSO) Administrator requests it. This secret key is stored in the registry as a Local Security Authority (LSA) secret on the master secret server. Only SSO Administrators can access this secret key. -
8 ar-sa مسؤولية حالية
"An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases." -
9 elliptic curve cryptography
"An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases."English-Arabic terms dictionary > elliptic curve cryptography
-
10 RSA
"A public-key encryption standard for Internet security. It is the default cryptographic service provider (CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977. This acronym derives from the last names of the inventors of the technology: Rivest, Shamir, and Adleman." -
11 health certificate
"An X.509 certificate that asserts the health of a client computer. Client computers can use this certificate to prove their identities and health through security services and mechanisms such as Internet Protocol security (IPsec) and Internet Key Exchange (IKE), which recognize the X.509 standard." -
12 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
13 SSL
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
14 dongle
A security device connected to an input/output port to permit the use of a particular software package on that computer. The use of the hardware key hash permits backup copying of software but prevents its unlicensed use on additional computers. -
15 S/MIME
An Internet e-mail security-oriented protocol that adds public key encryption and support for digital signatures to the widely used MIME e-mail protocol.S/MIME -
16 Secure/Multipurpose Internet Mail Extensions
An Internet e-mail security-oriented protocol that adds public key encryption and support for digital signatures to the widely used MIME e-mail protocol.ملحقات بريد الإنترنت متعددة الأغراض/آمنةEnglish-Arabic terms dictionary > Secure/Multipurpose Internet Mail Extensions
-
17 Wired Equivalent Privacy
"An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options." -
18 WEP
"An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options." -
19 PMK
A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process. -
20 certificate issuance policy
A set of rules that defines all the security-relevant requirements (such as key management and authentication levels) that must be met when certificates are issued to users.English-Arabic terms dictionary > certificate issuance policy
См. также в других словарях:
Internet Security Association and Key Management Protocol — ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in an Internet environment. The protocol is defined by RFC 2408. Overview ISAKMP defines the… … Wikipedia
Internet Security Association and Key Management Protocol — ISAKMP im TCP/IP‑Protokollstapel: Anwendung ISAKMP Transport UDP TCP Internet IP (IPv4, IPv6) Netzzugang Ethernet … Deutsch Wikipedia
Internet Security Association and Key Management Protocol — (ISAKMP) es un protocolo criptográfico que constituye la base del protocolo de intercambio de claves IKE. Está definido en el RFC 2408. ISAKMP define los procedimientos para la autenticación entre pares, creación y gestión de asociaciones de… … Wikipedia Español
Security token — Several types of security tokens with a penny for scale … Wikipedia
Security interest — A security interest is a property interest created by agreement or by operation of law over assets to secure the performance of an obligation, usually the payment of a debt.[1] It gives the beneficiary of the security interest certain… … Wikipedia
Security Association — Eine Security Association (SA, dt. Sicherheitsverbindung) ist eine Vereinbarung zwischen zwei kommunizierenden Einheiten in Rechnernetzen. Sie beschreibt, wie die beiden Parteien Sicherheitsdienste anwenden werden, um sicher miteinander… … Deutsch Wikipedia
Key money — is used differently in different parts of the world. It sometimes means money paid to an existing tenant who assigns a lease to a new tenant where the rent is below market. It sometimes means a bribe to a landlord. In other parts of the world it… … Wikipedia
Key management — is a term used to describe two different fields; (1) cryptography, and (2) physical key management (or electronic key management) within building or campus access control.In cryptography, key management includes all of the provisions made in a… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
KEY-Record — KEY Resource Records dienen der Propagierung öffentlicher Schlüssel durch DNS. KEY Records wurden im Rahmen von DNSSEC (DNS Security) verwendet, ab 2004 aber durch die nahezu identischen DNSKEY Resource Records ersetzt. Inhaltsverzeichnis 1… … Deutsch Wikipedia
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia