- access control log
- журнал регистрации запросов на доступ и разрешенных доступов
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Control-Alt-Delete — This article is about the keyboard combination. For a list of keyboard shortcuts, see Table of keyboard shortcuts. For other uses, see Control Alt Delete (disambiguation). The keys Control Alt Delete highlighted on a QWERTY keyboard. Control Alt… … Wikipedia
Control panel (web hosting) — A Control panel in web hosting refers to the interface provided by the hosting company for the maintenance and monitoring of the hosted website. Some of the commonly available modules in most control panels: * Access to server logs. * Details of… … Wikipedia
Common Log File System — (CLFS) is a general purpose logging subsystem that is accessible to both kernel mode as well as user mode applications for building high performance transaction logs. It was introduced with Windows Server 2003 R2 and included in later Windows OSs … Wikipedia
Identity and Access Management — (IAM) is a concept that combines business processes, policies and technologies that enable companies to: * provide secure access to any resource. * efficiently control this access. * respond faster to changing relationships. * protect… … Wikipedia
Physical access — is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, Given physical access to an office, the knowledgeable attacker will quickly be able to find the… … Wikipedia
Datagram Congestion Control Protocol — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia
Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… … Wikipedia
Content-control software — DansGuardian blocking whitehouse.com … Wikipedia
Ship gun fire-control system — Mk 37 Director c1944 with Mk 12 (rectangular antenna) and Mk 22 orange peel Ship gun fire control systems (GFCS) enable remote and automatic targeting of guns against ships, aircraft, and shore targets, with or without the aid of radar or optical … Wikipedia
Microsoft Access — Microsoft Office Access 2010 running on Windows 7 Developer(s) Microsoft Corporation … Wikipedia