- compromised security
- нарушенная безопасность; раскрытая система безопасности
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Security Breach Notification Laws — have been enacted in most U.S. states since 2002. These laws were enacted in response to an escalating number of breaches of consumer databases containing personally identifiable information. [ [http://www.ncsl.org/programs/lis/cip/priv/breach.htm… … Wikipedia
Security breach notification laws — have been enacted in most U.S. states since 2002. These laws were enacted in response to an escalating number of breaches of consumer databases containing personally identifiable information.[1] The first such law, the California data security… … Wikipedia
Security-Enhanced Linux — The SELinux administrator in Fedora 8 Security Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, including United States Department of Defense style mandatory access controls,… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
security — noun 1 feeling safe/being free from worry ADJECTIVE ▪ greater ▪ emotional, psychological ▪ economic, financial ▪ job ▪ … Collocations dictionary
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
security procedure — noun A procedure or set of procedures followed to ensure that state secrets, trade secrets, data, etc. are not compromised … Wiktionary
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Payment Card Industry Data Security Standard — The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e purse, ATM, and POS cards. Defined by the Payment Card… … Wikipedia
Exploit (computer security) — An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended… … Wikipedia
Australian Security Intelligence Organisation — Infobox Government agency agency name = Australian Security Intelligence Organisation logo width = 350px headquarters = Canberra, Australian Capital Territory, Australia formed = 16 March 1949 jurisdiction = Commonwealth of Australia employees =… … Wikipedia