-
1 security ID
"In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created."معرّف الأمان -
2 security identifier
"In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created."معرّف الأمان -
3 access control list
"In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals." -
4 ACL
"In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals." -
5 Layer Two Tunneling Protocol
"An industry-standard Internet tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. For IP networks, L2TP traffic is sent as User Datagram Protocol (UDP) messages. In Microsoft operating systems, L2TP is used in conjunction with Internet Protocol security (IPSec) as a virtual private network (VPN) technology to provide remote access or router-to-router VPN connections. L2TP is described in RFC 2661."English-Arabic terms dictionary > Layer Two Tunneling Protocol
-
6 data center
"A facility used to house mission critical computer systems and associated components. It generally includes environmental controls (air conditioning, fire suppression, etc.), redundant/backup power supplies, redundant data communications connections and high security." -
7 threat model
"A systematic analysis of identifying assets, and assessing and documenting the security risks associated with those assets exposed via software. The threat modeling process involves an understanding of the goals of an adversary in attacking a system based on the systems assets of interest. The scope of the threat model is defined by the scope of functionality of software being modeled." -
8 federated domain
"A domain that is engaged in a trust relationship with another domain, which is also called a federation. This relationship is between two federation servers, and allows a system to provide controlled access to its resources or services to a user that belongs to another security realm without requiring the user to authenticate directly to the system and without the two systems sharing a database of user identities or passwords."
См. также в других словарях:
Committee on National Security Systems — CNSS Logo of the CNSS Agency overview Formed 16 October 2001 Preced … Wikipedia
IBM Internet Security Systems — is a security software provider which was founded in 1994 as Internet Security Systems, and is often known simply as ISS or ISSX (after its former NASDAQ ticker symbol). The company was acquired by IBM in 2006. History In 1992, while attending… … Wikipedia
Magal Security Systems — Ltd. Type Public (NASDAQ: MAGS),(TASE: MAGS) Industry Security … Wikipedia
Operational Security Systems — Operational Security Systems, Inc., also commonly referred to as OSS, is a small private company based in Atlanta, Georgia, specializing in the planning, design, installation, and maintenance of electronic security systems. Contents 1 History 2… … Wikipedia
Inter-Con Security Systems, Inc. — Infobox Company company name = Inter Con Security Systems, Inc. company type = Private Company location = Pasadena, California foundation = Alhambra, California (1973) industry = Private Security num employees = 25,000 homepage = [/… … Wikipedia
EADS Defence and Security Systems — EADS Défense et sécurité EADS Defence and Security Systems ou EADS DS est la branche militaire d EADS. Elle compte cinq sections: EADS Defence Electronics EADS Military Air Systems EADS Defence and Communications Systems MBDA (Activité… … Wikipédia en Français
Sealock Security Systems — The Sealock and parent company, Sealock Security Systems, Inc., are the only locking and sealing device and manufacturer of such devices admitted to C TPAT, the United States Customs Trade Partnership Against Terrorism … Wikipedia
Unican Security Systems Ltd. — Unican Security Systems Ltd. was a Canadian based company created by Aaron Fish in the 1960s and sold in 2000. At its sale, the company had over $800 million in sales annually and was the largest maker of key blanks and key copying machines in… … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… … Wikipedia
Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… … Wikipedia