- accidental disclosure of information
- случайное раскрытие содержания информации
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Information Security Management — Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Information security management (ISM) are controls that… … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Automated information systems security — In telecommunication, the term automated information systems security refers to measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by automated information systems. The… … Wikipedia
leak — /lik / (say leek) noun 1. an unintended hole, crack, or the like by which fluid, gas, etc., enters or escapes. 2. any avenue or means of unintended entrance or escape, or the entrance or escape itself. 3. Electricity a point where current escapes …
IT risk — Information technology risk, or IT risk, IT related risk, is a risk related to information technology. This relatively new term due to an increasing awareness that information security is simply one facet of a multitude of risks that are relevant … Wikipedia
Internet privacy — involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information… … Wikipedia
Official Secrets Act 1989 — The Official Secrets Act 1989[1] Parliament of the United Kingdom Long title An Act to replace section 2 of the Official Secrets Act 1911 by provisions p … Wikipedia
Data remanence — is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that… … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia
Coming out — For other uses, see Coming out (disambiguation). Part of a series on Lesbian, gay, bisexual, transgender (LGBT) people Sexual orientation … Wikipedia