- information security product
- продукт (средство) обеспечения безопасности информации
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Enterprise Information Security Architecture — (EISA) is a part of enterprise architecture focusing on information security throughout the enterprise. Definition Enterprise Information Security Architecture (EISA) is the practice of applying a comprehensive and rigorous method for describing… … Wikipedia
Chief information security officer — A chief information security officer (CISO) is the senior level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy and program to ensure information assets are adequately protected. The… … Wikipedia
Security as a service — refers to the practice of delivering traditional security applications as an Internet based service, on demand, to consumers and businesses. It is an example of the everything as a service trend and shares many of the common characteristics,… … Wikipedia
Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… … Wikipedia
Information technology consulting — (also called IT consulting, Computer consultancy, Computing consultancy, technology consulting business and technology services or IT advisory) is a field that focuses on advising businesses on how best to use information technology to meet their … Wikipedia
information system — Introduction an integrated set of components for collecting, storing, processing, and communicating information (information science). Business firms, other organizations, and individuals in contemporary society rely on information systems… … Universalium
Security Target — In an IT product certification process according to the Common Criteria (CC), a Security Target (ST) is the central document, typically provided by the developer of the product,that specifies security evaluation criteria to substantiate the… … Wikipedia
Security Practices and Research Student Association — The Security Practices and Research Student Association (SPARSA) is a Rochester Institute of Technology student run organization that addresses security related issues and how these issues affect multiple majors and disciplines. The ultimate goal … Wikipedia
Information technology audit — An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization s… … Wikipedia
Information technology security audit — A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system… … Wikipedia