- trusted hardware
- information securityeng.trusted hardwarerus.аппаратные средства защитыukr.апаратні засоби захистуАппаратная часть КСЗ
English-Russian dictionary of information security . 2014.
English-Russian dictionary of information security . 2014.
Hardware Functionality Scan — A Hardware Functionality Scan (HFS) is conducted in order to verify that a certain device is really what it claims to be. It s patented by Microsoft.Some operating systems only send copy protected content, such as movies, to an output device,… … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Trusted Execution Technology — (TET or TXT), formerly known as LaGrande Technology is a key component of Intel s initiative of safer computing . Intel Trusted Execution Technology (Intel TXT) is a hardware extension to some of Intel s microprocessors and respective chipsets,… … Wikipedia
Trusted Computing — (TC) ist eine Technologie, die von der Trusted Computing Group entwickelt und beworben wird. Der Ausdruck ist dem Fachausdruck Trusted System entlehnt, hat jedoch eine eigene Bedeutung. Trusted Computing bedeutet, dass der Betreiber eines PC… … Deutsch Wikipedia
Trusted Computing Group — Rechtsform Konsortium Gründung 2003[1] Sitz Beaverton (Oregon), USA[2] Website … Deutsch Wikipedia
Hardware-based full disk encryption — is being pursued by a number of HDD vendors including Intel, Seagate Technology, and Hitachi, Ltd. with the rest of the hard drive industry following. Encryption and the symmetric encryption key is maintained independently from the CPU, thus… … Wikipedia
Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… … Wikipedia
Trusted Network Connect — or TNC is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group (TNC WG) of the Trusted Computing Group (TCG). It aims at enabling network operators to provide endpoint integrity at every network… … Wikipedia
trusted systems — Computer systems designed to prevent copying of the digital work and may be either hardware or software. The hardware and software are designed to follow certain rules, called usage rights, which specify the cost and a series of terms and… … Law dictionary
Trusted Platform — Dieser Artikel oder Abschnitt bedarf einer Überarbeitung. Näheres ist auf der Diskussionsseite angegeben. Hilf mit, ihn zu verbessern, und entferne anschließend diese Markierung. Trusted Computing (TC) ist eine Technologie, die von der Trusted… … Deutsch Wikipedia
Trusted computing — Dieser Artikel oder Abschnitt bedarf einer Überarbeitung. Näheres ist auf der Diskussionsseite angegeben. Hilf mit, ihn zu verbessern, und entferne anschließend diese Markierung. Trusted Computing (TC) ist eine Technologie, die von der Trusted… … Deutsch Wikipedia