-
1 user access privilege
Безопасность: привилегия пользователя на доступ -
2 user access privilege
Англо-русский словарь по компьютерной безопасности > user access privilege
-
3 user interface privilege level
The integrity level that is stored in the access token of a process and that is used by the UI Privilege Isolation (UIPI) feature to determine if an application or process is permitted to send Windows messages to another application or process.English-Arabic terms dictionary > user interface privilege level
-
4 privilege
Англо-русский словарь по компьютерной безопасности > privilege
-
5 elevation of privilege
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information." -
6 full access
"A privilege on a computer system that allows a user to read, write, and delete data." -
7 read access
A privilege on a computer system that allows a user to read stored data. -
8 code
-
9 elevation
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information." -
10 Global
A privilege level that specifies the user has access to objects anywhere within the organization. The application refers to this level as Organization. -
11 security model
"A structure that organizes application access control permissions by using privilege, duty, and business process classifiers and that grants permissions that are aggregated into duties to user role assignments."
См. также в других словарях:
User Interface Privilege Isolation — (UIPI) is a technology introduced in Windows Vista and Windows Server 2008 to combat code injection exploits. By leveraging Mandatory Integrity Control, it prevents processes with a lower integrity level (IL) from sending messages to higher IL… … Wikipedia
Privilege escalation — is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application… … Wikipedia
User Account Control — (UAC) is a technology and security infrastructure introduced with Microsoft s Windows Vista operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator … Wikipedia
Privilege separation — In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the specific privileges they require in order to perform a specific task. This is used to mitigate… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Privilege level — order in Intel x86 microprocessors. A privilege level in the x86 instruction set controls the access of the program currently running on the processor to resources such as memory regions, I/O ports, and special instructions. There are 4 privilege … Wikipedia
User Account Control — (UAC, contrôle du compte de l utilisateur), est un mécanisme de protection des données introduit dans les systèmes d exploitations Windows Vista et 7. UAC est aussi connu sous ses dénominations précédentes durant le développement de Windows Vista … Wikipédia en Français
Privilege (computing) — In computing, privilege is defined as the delegation of authority over a computer system. A privilege is a permission to perform an action. Examples of various privileges include the ability to create a file in a directory, or to read or delete a … Wikipedia
Access token — In Microsoft Windows operating systems, an access token contains the security information for a login session and identifies the user, the user s groups, and the user s privileges. OverviewAn access token is as an object encapsulating the… … Wikipedia
privilege level — 1. Those rights granted to a user or a group of users by the network administrator that determine the functions the user can execute. Rights form an important component of network security and can include supervisor rights and read, write,… … Dictionary of networking
User space — kernel space redirects here. For mathematical definition, see null space. A conventional operating system usually segregates virtual memory into kernel space and user space. Kernel space is strictly reserved for running the kernel, kernel… … Wikipedia