security threat monitoring

security threat monitoring
текущий контроль (за угрозами) нарушения безопасности (напр., хранения данных)

Большой англо-русский и русско-английский словарь. 2001.

Игры ⚽ Поможем написать реферат

Смотреть что такое "security threat monitoring" в других словарях:

  • Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… …   Wikipedia

  • Security Level Management — (SLM) ist ein Qualitätssicherungssystem für die elektronische Informationssicherheit. SLM hat zum Ziel, den IT Sicherheitsstatus jederzeit unternehmensweit transparent darzustellen und IT Sicherheit zu einer messbaren Größe zu machen. Transparenz …   Deutsch Wikipedia

  • Security certificate — This article is about the Canadian legal mechanism. For Internet security certificates, see Public key certificate. In Canadian law, a security certificate is a mechanism by which the Government of Canada can detain and deport foreign nationals… …   Wikipedia

  • Security Operation Center (computing) — A Security Operation Center (SOC) is an organization that delivers IT security services. It attempts to prevent unauthorized access and manage security related incidents using processes and procedures. The mission is risk management through… …   Wikipedia

  • Security vs. Civil Liberties — ▪ 2003 By Stephen J. Phillips       Technology was at the forefront of international efforts to fight terrorism and bolster security in 2002 in the wake of the terrorist attacks in the U.S. on Sept. 11, 2001. The rush to deploy new technologies… …   Universalium

  • Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Homeland Security Advisory System — HSAS redirects here. For the rock band, see Hagar Schon Aaronson Shrieve. For the UK terror threat level system, see UK Threat Levels. Homeland Security Advisory System color chart In the United States, the Homeland Security Advisory System was a …   Wikipedia

  • United States Department of Homeland Security — DHS redirects here. For other uses, see DHS (disambiguation). United States Department of Homeland Security Agency overview Formed …   Wikipedia

  • Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… …   Wikipedia

  • Windows Security Center — Infobox Windows component name = Windows Security Center logo = logo size = caption = Windows Security Center in Windows Vista. service name = wscsvc service description= Security Center included with = Windows XP (SP2, SP3) Windows Vista related …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»