- required security level
- требуемый уровень секретного допуска
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Security Architecture — Security provided by IT Systems can be defined as the IT system’s ability to being able to protect confidentiality and integrity of processed data, as well as to be able to provide availability of the system and data.“IT Architecture” may be… … Wikipedia
security — /si kyoor i tee/, n., pl. securities, adj. n. 1. freedom from danger, risk, etc.; safety. 2. freedom from care, anxiety, or doubt; well founded confidence. 3. something that secures or makes safe; protection; defense. 4. freedom from financial… … Universalium
Security token — Several types of security tokens with a penny for scale … Wikipedia
Security Operations Center — A Security Operations Center (SOC) is a centralized unit in an organization that deals with security issues, on an organizational an technical level. SOCs used for facility security An SOC within a building or facility is a central location from… … Wikipedia
Security Through Regularized Immigration and a Vibrant Economy Act of 2007 — The Security Through Regularized Immigration and a Vibrant Economy Act of 2007 or STRIVE Act of 2007 is proposed United States legislation designed to address the problem of illegal immigration, introduced into the United States House of… … Wikipedia
Security vs. Civil Liberties — ▪ 2003 By Stephen J. Phillips Technology was at the forefront of international efforts to fight terrorism and bolster security in 2002 in the wake of the terrorist attacks in the U.S. on Sept. 11, 2001. The rush to deploy new technologies… … Universalium
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia