access control log

access control log
журнал регистрации запросов на доступ и разрешенных доступов

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "access control log" в других словарях:

  • Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… …   Wikipedia

  • Control-Alt-Delete — This article is about the keyboard combination. For a list of keyboard shortcuts, see Table of keyboard shortcuts. For other uses, see Control Alt Delete (disambiguation). The keys Control Alt Delete highlighted on a QWERTY keyboard. Control Alt… …   Wikipedia

  • Control panel (web hosting) — A Control panel in web hosting refers to the interface provided by the hosting company for the maintenance and monitoring of the hosted website. Some of the commonly available modules in most control panels: * Access to server logs. * Details of… …   Wikipedia

  • Common Log File System — (CLFS) is a general purpose logging subsystem that is accessible to both kernel mode as well as user mode applications for building high performance transaction logs. It was introduced with Windows Server 2003 R2 and included in later Windows OSs …   Wikipedia

  • Identity and Access Management — (IAM) is a concept that combines business processes, policies and technologies that enable companies to: * provide secure access to any resource. * efficiently control this access. * respond faster to changing relationships. * protect… …   Wikipedia

  • Physical access — is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, Given physical access to an office, the knowledgeable attacker will quickly be able to find the… …   Wikipedia

  • Datagram Congestion Control Protocol — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP …   Wikipedia

  • Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… …   Wikipedia

  • Content-control software — DansGuardian blocking whitehouse.com …   Wikipedia

  • Ship gun fire-control system — Mk 37 Director c1944 with Mk 12 (rectangular antenna) and Mk 22 orange peel Ship gun fire control systems (GFCS) enable remote and automatic targeting of guns against ships, aircraft, and shore targets, with or without the aid of radar or optical …   Wikipedia

  • Microsoft Access — Microsoft Office Access 2010 running on Windows 7 Developer(s) Microsoft Corporation …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»