- simple security rule
- простое правило безопасности (категория допуска секретности субъекта должна быть равна или выше категории секретности объекта)
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Rule in Dearle v Hall — The rule in Dearle v Hall (1828) 3 Russ 1 is an English common law rule to determine priority between competing equitable claims to the same asset. The rule broadly provides that where the equitable owner of an asset purports to dispose of his… … Wikipedia
Security lighting — In the field of physical security, security lighting is often used as a preventative and corrective measure against intrusions or other criminal activity on a physical piece of property. Security lighting may be provided to aid in the detection… … Wikipedia
Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Net capital rule — The uniform net capital rule is a rule created by the U.S. Securities and Exchange Commission ( SEC ) in 1975 to regulate directly the ability of broker dealers to meet their financial obligations to customers and other creditors.[1] Broker… … Wikipedia
Khmer Rouge rule of Cambodia — History of Cambodia This article is part of a series Early history … Wikipedia
United States security assistance to the Palestinian Authority — (PA) has been provided since the Palestinian Authority was established by the Oslo Accords in the mid 1990s. The security assistance was given on an ad hoc basis and often covert at the outset. Since 2005 the U.S. State Department has… … Wikipedia
United Nations Security Council Resolution 242 — (S/RES/242) was adopted unanimously by the UN Security Council on November 22, 1967 in the aftermath of the Six Day War. It was adopted under Chapter VI of the United Nations Charter. [ [http://domino.un.org/unispal.nsf/db942872b9eae454852560f6005… … Wikipedia
Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp … Wikipedia
Norton Internet Security — The main, simplified graphical user interface of Norton Internet Security 2012 … Wikipedia