-
1 система паролей по обеспечению доступа с двухуровневой системой защиты
система паролей по обеспечению доступа с двухуровневой системой защиты
(для исключения несанкционированного доступа к системе управления АЭС)
[А.С.Гольдберг. Англо-русский энергетический словарь. 2006 г.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > система паролей по обеспечению доступа с двухуровневой системой защиты
-
2 система с двухуровневым паролем
система с двухуровневым паролем
(напр. для исключения несанкционированного доступа к системе управления)
[А.С.Гольдберг. Англо-русский энергетический словарь. 2006 г.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > система с двухуровневым паролем
См. также в других словарях:
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security-focused operating system — This is an alphabetical list of operating systems with a sharp security focus. Their order does not imply rank.In our context, Security focused means that the project is devoted to increasing the security as a major goal. As such, something can… … Wikipedia
IBM System/36 — The IBM System/36 was a minicomputer marketed by IBM from 1983 to 2000. It was a multi user, multi tasking successor to the System/34. Like the System/34 and the older System/32, the System/36 was primarily programmed in the RPG II language. One… … Wikipedia
Encrypting File System — The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS[1] that provides filesystem level encryption. The technology enables files to be transparently encrypted to protect confidential data from… … Wikipedia
IBM System/34 — The IBM System/34 was a minicomputer marketed by IBM from 1978 to 1983. It was a multi user, multi tasking successor to the single user System/32. Most notably, it included two very different processors, one based on System/32 and the second… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Logical security — consists of software safeguards for an organization’s systems, including user ID and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia