-
1 Security Support Provider Interface
"A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details."English-Arabic terms dictionary > Security Support Provider Interface
-
2 security association
"A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver." -
3 Layer Two Tunneling Protocol
"An industry-standard Internet tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. For IP networks, L2TP traffic is sent as User Datagram Protocol (UDP) messages. In Microsoft operating systems, L2TP is used in conjunction with Internet Protocol security (IPSec) as a virtual private network (VPN) technology to provide remote access or router-to-router VPN connections. L2TP is described in RFC 2661."English-Arabic terms dictionary > Layer Two Tunneling Protocol
-
4 Transport Layer Security
"A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol." -
5 Internet Protocol security
"A set of industry-standard, cryptography-based services and protocols that help to protect data over a network."English-Arabic terms dictionary > Internet Protocol security
-
6 SSPI
"A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details." -
7 TLS encryption
"A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)." -
8 Internet Key Exchange
A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec). -
9 IKE
A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec). -
10 S/MIME
An Internet e-mail security-oriented protocol that adds public key encryption and support for digital signatures to the widely used MIME e-mail protocol.S/MIME -
11 Secure/Multipurpose Internet Mail Extensions
An Internet e-mail security-oriented protocol that adds public key encryption and support for digital signatures to the widely used MIME e-mail protocol.ملحقات بريد الإنترنت متعددة الأغراض/آمنةEnglish-Arabic terms dictionary > Secure/Multipurpose Internet Mail Extensions
-
12 TLS
"A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol." -
13 confidentiality
"A basic security function of cryptography that ensures that only authorized users can read or use confidential or secret information. Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network traffic and intercept valuable proprietary information. For example, an Internet Protocol security service ensures that a message is disclosed only to intended recipients by encrypting the data."السرّية -
14 health certificate
"An X.509 certificate that asserts the health of a client computer. Client computers can use this certificate to prove their identities and health through security services and mechanisms such as Internet Protocol security (IPsec) and Internet Key Exchange (IKE), which recognize the X.509 standard." -
15 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
16 SSL
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
17 MD5
"An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication." -
18 Pairwise Master Key
A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process. -
19 PMK
A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process. -
20 SA
"A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver."SA
- 1
- 2
См. также в других словарях:
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia
Message Security Protocol — A protocol for securing e mail and document transmission … IT glossary of terms, acronyms and abbreviations
Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… … Wikipedia
Security Association — Eine Security Association (SA, dt. Sicherheitsverbindung) ist eine Vereinbarung zwischen zwei kommunizierenden Einheiten in Rechnernetzen. Sie beschreibt, wie die beiden Parteien Sicherheitsdienste anwenden werden, um sicher miteinander… … Deutsch Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Protocol Concerning the Redeployment in Hebron — Protocol Concerning the Redeployment in Hebron, also known as The Hebron Protocol or Hebron Agreement, began January 7 and was concluded from January 15 to January 17 1997 between Israel, represented by Prime Minister of Israel Benjamin Netanyahu … Wikipedia
protocol — pro‧to‧col [ˈprəʊtəkɒl ǁ ˈproʊtəkɒːl, kɑːl] noun 1. [countable] COMPUTING an established method for connecting computers so that they can exchange information: • You have to use a different protocol with this new modem. • HTTP is an Internet… … Financial and business terms
Protocol spoofing — is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.Note: In a computer security context, spoofing refers to various forms of… … Wikipedia
Security Device Event Exchange — (SDEE) is a new standard proposed by ICSA that specifies the format of messages and protocol used to communicate events generated by security devices. This protocol is used in the Cisco IPS Sensor 5.0 to replace RDEP, which is used by earlier… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia