-
1 security policy
The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run. -
2 security log
An event log containing information on security events that are specified in the audit policy. -
3 security filtering
A method of applying the settings of a Group Policy object (GPO) based on security principals. -
4 Security API
"An API for asset protection, usage control, privacy, and policy application." -
5 code access security
"A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform." -
6 audit policy
A policy that determines the security events to be reported to the network administrator. -
7 health policy
"A collection of software requirements, security update requirements, and required configuration settings for NAP client computers." -
8 certificate issuance policy
A set of rules that defines all the security-relevant requirements (such as key management and authentication levels) that must be met when certificates are issued to users.English-Arabic terms dictionary > certificate issuance policy
-
9 granted permissions
"The permissions, determined by security policy, that code will be given, allowing it access to resources and giving it identity. The granted permissions are determined by both the requested permissions and what is allowed by the security policy configuration." -
10 product vulnerability
A set of conditions that violates an implied or explicit security policy. A product vulnerability is normally addressed by a Microsoft security bulletin or a service pack. -
11 account lockout
"A Windows security feature that locks a user account if a number of failed logon attempts occur within a specified amount of time, based on security policy lockout settings. Locked accounts cannot log on." -
12 evidence
"The properties of code, such as a digital signature or the zone or site of its origin, that are used by security policy to grant permissions to code." -
13 requested permissions
"Optionally specified permissions in an assembly that represent the minimum required, optionally desired, and always refused permissions for all code in the assembly. If there is no request, the code is granted the maximum that security policy allows." -
14 ar-sa معرف الأمان
An event log containing information on security events that are specified in the audit policy. -
15 trusted forest
"A forest that is trusted to make authentication statements for security principals in that forest. Assuming forest A trusts forest B, all domains belonging to forest A will trust all domains in forest B, subject to policy configuration." -
16 Admin Approval Mode
"A security feature of Windows that allows administrators to perform normal day-to-day tasks while running with a standard user token. If administrator privileges are needed for an operation, the administrator will be notified and asked to provide either consent or credentials, depending on system policy settings."
См. также в других словарях:
Security policy — is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors,… … Wikipedia
security policy — saugumo politika statusas T sritis informatika apibrėžtis Taisyklės ir procedūros, nusakančios, kaip tam tikra organizacija arba kompiuterinė sistema teikia ↑saugumo paslaugas išteklių saugumui užtikrinti. pavyzdys( iai) liudijimų įstaigos… … Enciklopedinis kompiuterijos žodynas
security policy — saugumo taisyklės statusas T sritis informatika apibrėžtis Taisyklės, kuriomis nusakoma, kaip tam tikra organizacija arba kompiuterinė sistema teikia ↑saugumo paslaugas išteklių saugumui užtikrinti. Gali būti pateiktos formaliu pavidalu (tam, kad … Enciklopedinis kompiuterijos žodynas
Security Policy — Eine Sicherheitsrichtlinie (auch Sicherheitsleitlinie, Sicherheitspolitik) beschreibt den erstrebten Sicherheitsanspruch einer Institution (Behörde, Unternehmen, Verband etc.). Mit Sicherheit ist hier in der Regel Informationssicherheit gemeint.… … Deutsch Wikipedia
Security Policy — Formally listed as a EC objective in the Single European Act (SEA), and institutionalized in the Treaty on European Union, but not yet established in practice … Glossary of the European Union and European Communities
Common Foreign and Security Policy — This article deals with the workings of European Union foreign policy. For the relations between the European Union and third countries, see Foreign relations of the European Union. European Union This a … Wikipedia
Center for Security Policy — infobox Organization name = Center for Security Policy size = abbreviation = motto = formation = 1988 type = National security Think Tank headquarters = location = leader title = leader name = website = http://www.centerforsecuritypolicy.org The… … Wikipedia
Computer security policy — A computer security policy defines the goals and elements of an organization s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical… … Wikipedia
Council for Foreign and Security Policy — The Council for Foreign and Security Policy (CFSP) (Ukrainian: Рада із зовнішньої та безпекової політики) is a non governmental research organization focusing on the Ukrainian national and foreign security policy to develop well grounded… … Wikipedia
Information security policy documents — An information security policy document contains the written statements for how an organization intends to protect information. Written information security policy documents are required for compliance with various security and privacy… … Wikipedia
Network security policy — A network security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document… … Wikipedia