Перевод: со всех языков на арабский

с арабского на все языки

security+system

  • 1 security role

    A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system.

    English-Arabic terms dictionary > security role

  • 2 System Agent

    "An agent that monitors checkpoints for potential threats making unauthorized or hazardous changes to your computer, such as altering your security permissions or system settings."

    English-Arabic terms dictionary > System Agent

  • 3 security

    Protection of a computer system and its data from harm or loss.

    English-Arabic terms dictionary > security

  • 4 system administrator

    "The person responsible for setting up and managing local computers, stand-alone servers, member servers, or domain controllers. An administrator performs such duties as assigning user accounts and passwords, establishing security access levels, watching for unauthorized access, allocating storage space, and helping users with networking problems."

    English-Arabic terms dictionary > system administrator

  • 5 Windows Security Health Agent

    "Windows system health agent (SHA) for Network Access Protection (NAP). Windows Security Health Agent provides status of system health components that are monitored by Windows Security Center, such as the status of Windows Firewall, antivirus applications, and Windows Update."

    English-Arabic terms dictionary > Windows Security Health Agent

  • 6 Windows Security Health Validator

    Windows system health validator (SHV) for Network Access Protection (NAP). Windows Security Health Validator verifies status of system health components that are received in a statement of health (SoH) from NAP client computers that have the Windows Security Health Agent installed.
    ‏مدقق صحة أمان Windows

    English-Arabic terms dictionary > Windows Security Health Validator

  • 7 NTFS file system

    "An advanced file system designed for use specifically with the Windows NT operating system. It supports long filenames, full security access control, file system recovery, extremely large storage media, and various features for the Windows NT POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes."

    English-Arabic terms dictionary > NTFS file system

  • 8 authentication service

    "A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer."

    English-Arabic terms dictionary > authentication service

  • 9 full trust

    "A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported."

    English-Arabic terms dictionary > full trust

  • 10 WSHA

    "Windows system health agent (SHA) for Network Access Protection (NAP). Windows Security Health Agent provides status of system health components that are monitored by Windows Security Center, such as the status of Windows Firewall, antivirus applications, and Windows Update."

    English-Arabic terms dictionary > WSHA

  • 11 WSHV

    Windows system health validator (SHV) for Network Access Protection (NAP). Windows Security Health Validator verifies status of system health components that are received in a statement of health (SoH) from NAP client computers that have the Windows Security Health Agent installed.

    English-Arabic terms dictionary > WSHV

  • 12 NTFS

    "An advanced file system designed for use specifically with the Windows NT operating system. It supports long filenames, full security access control, file system recovery, extremely large storage media, and various features for the Windows NT POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes."

    English-Arabic terms dictionary > NTFS

  • 13 auditing

    "The process an operating system uses to detect and record security-related events, such as an attempt to create, to access, or to delete objects such as files and directories. The records of such events are stored in a file known as a security log, whose contents are available only to those with the proper clearance."

    English-Arabic terms dictionary > auditing

  • 14 Event Viewer

    "A component you can use to view and manage event logs, gather information about hardware and software problems, and monitor security events. Event Viewer maintains logs about program, security, and system events."

    English-Arabic terms dictionary > Event Viewer

  • 15 back door

    A hardware or software-based hidden entrance to a computer system that can be used to bypass the system's security policies.

    English-Arabic terms dictionary > back door

  • 16 federated domain

    "A domain that is engaged in a trust relationship with another domain, which is also called a federation. This relationship is between two federation servers, and allows a system to provide controlled access to its resources or services to a user that belongs to another security realm without requiring the user to authenticate directly to the system and without the two systems sharing a database of user identities or passwords."

    English-Arabic terms dictionary > federated domain

  • 17 managed code

    "Code that is executed by the common language runtime environment rather than directly by the operating system. Managed code applications gain common language runtime services such as automatic garbage collection, runtime type checking and security support, and so on. These services help provide uniform platform- and language-independent behavior of managed-code applications."
    تعليمات برمجية مُدارة

    English-Arabic terms dictionary > managed code

  • 18 ar-sa التحكم بالوصول

    "An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object."

    English-Arabic terms dictionary > ar-sa التحكم بالوصول

  • 19 access control entry

    "An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object."

    English-Arabic terms dictionary > access control entry

  • 20 ACE

    "An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object."

    English-Arabic terms dictionary > ACE

См. также в других словарях:

  • security system — noun 1. (computing) a system that enforces boundaries between computer networks • Topics: ↑computer science, ↑computing • Hypernyms: ↑system • Hyponyms: ↑firewall 2 …   Useful english dictionary

  • security system — See anti theft system …   Dictionary of automotive terms

  • Underwater Port Security System — See UIS and IAS for other meanings of these initials. : For other diver detector sonars, see .UPSS stands for Underwater Port Security System, developed for the United States Coast Guard and the MSST (= Maritime Safety and Security Teams) as an… …   Wikipedia

  • Regional Security System — The Regional Security System (RSS) is an international agreement for the defence and security of the eastern Caribbean region.The Regional Security System was created out of a need for collective response to security threats, which were impacting …   Wikipedia

  • Social Security System —   [ səʊʃl sɪ kjʊərətɪ sɪstəm], populäre Bezeichnung für das bundesstaatliche Sozialversicherungssystem der USA (eigentlich Old Age, Survivors and Disability Insurance, Abkürzung OASDI), 1935 im Rahmen des New Deal mit dem Social Security Act… …   Universal-Lexikon

  • Weapon Storage Security System (WS3) — is a marking for the vaults built into the floors of Protective Aircraft Shelters (PAS) on several United States and NATO military airfields all over the world. These vaults are used for a safe special weapons storage, typically of tactical B61… …   Wikipedia

  • Weapon Storage and Security System WS3 — General Roger Brady besichtigt eine Übungsbombe in der Volkel Air Base Das Weapon Storage and Security System (WS3) ist eine Konstruktion, Nuklearwaffen in den Flugzeughangars in Gruben zu lagern. Es wird in Flugplätzen der US Army und der NATO… …   Deutsch Wikipedia

  • Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… …   Wikipedia

  • Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… …   Wikipedia

  • Security Information Management — (SIM) is the industry specific term in computer security referring to the collection of data (typically log files; e.g. eventlogs) into a central repository for trend analysis. SIM is a relatively new idea, pioneered in 1999 by a small company… …   Wikipedia

  • Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»