eavesdropping threat

eavesdropping threat
угроза подслушивания

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем написать реферат

Смотреть что такое "eavesdropping threat" в других словарях:

  • Radiofrequency MASINT — is one of the six major disciplines generally accepted to make up the field of Measurement and Signature Intelligence (MASINT), with due regard that the MASINT subdisciplines may overlap, and MASINT, in turn, is complementary to more traditional… …   Wikipedia

  • Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… …   Wikipedia

  • Surveillance — For other uses, see Surveillance (disambiguation). A nest of surveillance cameras at the Gillette Stadium in Foxborough, Massachusetts Surveillance ( …   Wikipedia

  • NSA warrantless surveillance controversy — For the related controversy about data mining of domestic call records see NSA call database. National Security Agency logo The NSA warrantless surveillance controversy (AKA Warrantless Wiretapping ) concerns surveillance of persons within the… …   Wikipedia

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • Telephone tapping — Wiretap redirects here. For the radio program, see WireTap (radio program). Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means …   Wikipedia

  • HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · …   Wikipedia

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Industrial espionage — Teapot with Actresses, Vezzi porcelain factory, Venice, ca. 1725. The Vezzi brothers were involved in a series of incidents of industrial espionage. It was these actions that led to the secret of manufacturing Meissen porcelain becoming widely… …   Wikipedia

  • Congressional response to the NSA warrantless surveillance program — Congressional inquiries and investigations Three days after news broke about the Terrorist Surveillance Program, a bipartisan group of Senators Democrats Dianne Feinstein of California, Carl Levin of Michigan, Ron Wyden of Oregon and Republicans… …   Wikipedia

  • United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… …   Universalium


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»