Перевод: со всех языков на все языки

со всех языков на все языки

unauthorized modification of information

См. также в других словарях:

  • information security — The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those… …   Military dictionary

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Information sensitivity — Sensitive information is information or knowledge that might result in loss of an advantage or level of security if revealed (disclosed) to others who might have low or unknown trustability and/or indeterminable or hostile intentions.Loss, misuse …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • National Information Infrastructure Protection Act — The National Information Infrastructure Protection Act (Pub.L. 104 294, 110 Stat. 3488, enacted October 11, 1996; H.R. 3723) was Title II of the Economic Espionage Act of 1996, as an amendment to the Computer Fraud and Abuse… …   Wikipedia

  • Automated information systems security — In telecommunication, the term automated information systems security refers to measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by automated information systems. The… …   Wikipedia

  • несанкционированное изменение информации — Изменение содержания информации при ее обработке, хранении или передаче с нарушением установленных прав и правил разграничения доступа. [ОСТ 45.127 99] Тематики защита информации Обобщающие термины угроза информационной безопасности… …   Справочник технического переводчика

  • Digital forensics — Forensic science Physiological sciences …   Wikipedia

  • Penetration test — A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any… …   Wikipedia

  • Parkerian Hexad — The Parkerian hexad is a set of six elements of information security proposed by Donn B. Parker. The term was coined by M. E. Kabay. The Parkerian hexad adds three additional attributes to the three classic security attributes of the CIA triad… …   Wikipedia

  • Kazaa — infobox software name = Kazaa Media Desktop developer = Sharman Networks latest release version = 3.2.5 latest release date = 2006 operating system = Microsoft Windows genre = Peer to peer license = Adware/spyware supported website =… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»