-
1 unauthorized modification of information
несанкционированное изменение информации
Изменение содержания информации при ее обработке, хранении или передаче с нарушением установленных прав и правил разграничения доступа.
[ОСТ 45.127-99]Тематики
Обобщающие термины
- угроза информационной безопасности Взаимоувязанной сети связи Российской Федерации
EN
Англо-русский словарь нормативно-технической терминологии > unauthorized modification of information
-
2 несанкционированное изменение информации
несанкционированное изменение информации
Изменение содержания информации при ее обработке, хранении или передаче с нарушением установленных прав и правил разграничения доступа.
[ОСТ 45.127-99]Тематики
Обобщающие термины
- угроза информационной безопасности Взаимоувязанной сети связи Российской Федерации
EN
Русско-английский словарь нормативно-технической терминологии > несанкционированное изменение информации
См. также в других словарях:
information security — The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those… … Military dictionary
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Information sensitivity — Sensitive information is information or knowledge that might result in loss of an advantage or level of security if revealed (disclosed) to others who might have low or unknown trustability and/or indeterminable or hostile intentions.Loss, misuse … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
National Information Infrastructure Protection Act — The National Information Infrastructure Protection Act (Pub.L. 104 294, 110 Stat. 3488, enacted October 11, 1996; H.R. 3723) was Title II of the Economic Espionage Act of 1996, as an amendment to the Computer Fraud and Abuse… … Wikipedia
Automated information systems security — In telecommunication, the term automated information systems security refers to measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by automated information systems. The… … Wikipedia
несанкционированное изменение информации — Изменение содержания информации при ее обработке, хранении или передаче с нарушением установленных прав и правил разграничения доступа. [ОСТ 45.127 99] Тематики защита информации Обобщающие термины угроза информационной безопасности… … Справочник технического переводчика
Digital forensics — Forensic science Physiological sciences … Wikipedia
Penetration test — A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any… … Wikipedia
Parkerian Hexad — The Parkerian hexad is a set of six elements of information security proposed by Donn B. Parker. The term was coined by M. E. Kabay. The Parkerian hexad adds three additional attributes to the three classic security attributes of the CIA triad… … Wikipedia
Kazaa — infobox software name = Kazaa Media Desktop developer = Sharman Networks latest release version = 3.2.5 latest release date = 2006 operating system = Microsoft Windows genre = Peer to peer license = Adware/spyware supported website =… … Wikipedia