security actions plan

security actions plan
план мероприятий по обеспечению безопасности

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "security actions plan" в других словарях:

  • Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… …   Wikipedia

  • Plan W — (sometimes referred to as the W Plan Fact|date=March 2007), during the Second World War, was a plan of joint military operations between Ireland and the United Kingdom devised between 1940–1942, to be executed in the event of a an invasion of… …   Wikipedia

  • Plan de restructuration — Restructuration Une restructuration est une opération par laquelle un ensemble organisé voit sa structure organisationnelle remaniée en vue d’atteindre à une nouvelle configuration. Le terme est principalement utilisé en urbanisme et en… …   Wikipédia en Français

  • Plan Condor — Opération Condor Pour les articles homonymes, voir Opération Condor (homonymie). L opération Condor (en espagnol : Operación Cóndor) est le nom donné à une campagne d assassinats et de lutte anti guérilla conduite conjointement par les… …   Wikipédia en Français

  • Plan Colombie — Le plan Colombie (en espagnol, Plan Colombia), est un plan né en partie avec les discours électoraux d’Andrés Pastrana, proposant un Plan Marshall pour la Colombie, en même temps que des stratégies nouvelles de lutte contre le narcotrafic[1]. Ce… …   Wikipédia en Français

  • Security issues in Colombia — This article covers national and international security issues in Colombia. External threats Colombia does not face any known foreign threats. The only neighbor that might pose a potential military challenge over as yet unresolved territorial… …   Wikipedia

  • Actions in Inner Mongolia (1933–1936) — Warbox conflict=Inner Mongolia (1933 36) partof=Second Sino Japanese War date=April 1933 to December 1936 place= Chahar and Suiyuan provinces result= 1933 Japanese victory, 1936 Chinese victory combatant1= 1933 flagicon|Japan Imperial Japanese… …   Wikipedia

  • ITIL Security Management — The ITIL Security Management process describes the structured fitting of security in the management organization. ITIL Security Management is based on the Code of practice for information security management also known as ISO/IEC 17799.A basic… …   Wikipedia

  • National Special Security Event — Secretary of Homeland Security Janet Napolitano (center) at a security news conference for Super Bowl XLIV, on February 1, 2010 A National Special Security Event (NSSE) is an event of national or international significance deemed by the United… …   Wikipedia

  • Covert United States foreign regime change actions — History of the United States This article is part of a series United States Portal …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»