-
1 software update
"Any update, update rollup, service pack, feature pack, critical update, security update, or hotfix used to improve or fix a software product released by Microsoft Corporation." -
2 security disabler
A type of Trojan that disables security settings or products such as antivirus software. -
3 Microsoft Malware Protection Center
"A web portal that supplies the core malicious software (malware)-fighting technology, including the scanning engine and malware definition updates, for Microsoft Forefront Client Security, Forefront Server Security Management Console, Windows Live OneCare, Windows Defender, and other Microsoft security solutions and technologies."English-Arabic terms dictionary > Microsoft Malware Protection Center
-
4 dongle
A security device connected to an input/output port to permit the use of a particular software package on that computer. The use of the hardware key hash permits backup copying of software but prevents its unlicensed use on additional computers. -
5 high priority update
A classification used on the Windows Update web site and by the Windows Update Service to recommend Microsoft software updates and drivers that help protect against the latest publicly known security threats and reliability issues. All software updates and drivers that can be installed by turning on Automatic Updates on your computer are classified as high priority. These can also be installed by visiting the Windows Update web site. -
6 Application Compatibility Toolkit
"A suite of tools that enables software developers, independent software vendors (ISVs), and enterprise IT professionals to determine whether their applications are compatible with a new version of Windows before rolling it out to the company. ACT also enables such individuals to determine how Windows security updates may impact their applications."English-Arabic terms dictionary > Application Compatibility Toolkit
-
7 threat model
"A systematic analysis of identifying assets, and assessing and documenting the security risks associated with those assets exposed via software. The threat modeling process involves an understanding of the goals of an adversary in attacking a system based on the systems assets of interest. The scope of the threat model is defined by the scope of functionality of software being modeled." -
8 Event Viewer
"A component you can use to view and manage event logs, gather information about hardware and software problems, and monitor security events. Event Viewer maintains logs about program, security, and system events." -
9 Windows Intune Endpoint Protection
"A security solution that helps enhance the security of client computers by providing real-time protection against potential threats; keeping malicious software, or malware, definitions up-to-date; and automatically running scans."English-Arabic terms dictionary > Windows Intune Endpoint Protection
-
10 Endpoint Protection
"A security solution that helps enhance the security of client computers by providing real-time protection against potential threats; keeping malicious software, or malware, definitions up-to-date; and automatically running scans." -
11 MSRC severity
"A rating that describes the severity of a security issue addressed by a software update, as determined by the Microsoft Security Response Center (MSRC)." -
12 back door
A hardware or software-based hidden entrance to a computer system that can be used to bypass the system's security policies. -
13 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
14 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
15 trusted platform module
Microchip designed to provide certain basic security-related functions to the software that utilizes TPM. -
16 TPM
Microchip designed to provide certain basic security-related functions to the software that utilizes TPM. -
17 health policy
"A collection of software requirements, security update requirements, and required configuration settings for NAP client computers." -
18 standard account
A type of user account that allows users to install software and change system settings that do not affect other users or the security of the computer. This account type is recommended for daily use. -
19 Microsoft® Office Communicator 2007
"Microsoft instant messaging software that provides security-enhanced, enterprise-grade instant messaging with enhanced voice, video and telephony integration."Microsoft® Office Communicator 2007English-Arabic terms dictionary > Microsoft® Office Communicator 2007
-
20 host adapter
A software component that lets you run tests in a specific environment. This hosting environment may be a specific process such as sqprsqext or a process with particular traits such as limited security or custom environment variables.
- 1
- 2
См. также в других словарях:
Software Security Assurance — Software is itself a resource and thus must be afforded appropriate security. Software also contains and controls data and other resources. Therefore, it must be designed and implemented to protect those resources. Software Security Assurance is… … Wikipedia
software security device — programinė saugumo priemonė statusas T sritis informatika apibrėžtis ↑Saugumo priemonė, kurią naudoja ↑liudijimų tvarkytuvė saugoti ↑privatiesiems raktams, susijusiems su liudijimais. Taip pat saugo ↑pagrindinį slaptažodį, kurį ↑slaptažodžių… … Enciklopedinis kompiuterijos žodynas
Open source software security — is the measure of assurance or guarantee in the freedom from danger and risk inherent to an open source software system. Contents 1 The debate 1.1 Benefits of open source security 1.2 Drawbacks of open source security … Wikipedia
Software Assurance — (SwA) is defined as “the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at anytime during its lifecycle, and that the software functions in the intended… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Security innovation — Infobox Company company name = Security Innovation, Inc. company company type = Private foundation = 2002 location = Wilmington, MA products = Team Mentor, Holodeck, Checkmarx industry = Enterprise Software Software Security homepage =… … Wikipedia
Security-focused operating system — This is an alphabetical list of operating systems with a sharp security focus. Their order does not imply rank.In our context, Security focused means that the project is devoted to increasing the security as a major goal. As such, something can… … Wikipedia
Security bug — A security bug is a software bug that benefits someone other than intended beneficiaries in the intended ways. Security bugs introduce security vulnerabilities by compromising one or more of: * Authentication of users and other entities *… … Wikipedia
Security-evaluated operating system — A security evaluated operating system is an operating system that has achieved a certification from an external security auditing organization, such as a B2 or A1 CSC STD 001 83 Department of Defense Trusted Computer System Evaluation Criteria or … Wikipedia
Security as a service — refers to the practice of delivering traditional security applications as an Internet based service, on demand, to consumers and businesses. It is an example of the everything as a service trend and shares many of the common characteristics,… … Wikipedia
Software testing — is an empirical investigation conducted to provide stakeholders with information about the quality of the product or service under test [ [http://www.kaner.com/pdfs/ETatQAI.pdf Exploratory Testing] , Cem Kaner, Florida Institute of Technology,… … Wikipedia