data base audit

data base audit
information security
eng.data base audit
rus.ревизия базы данных
ukr.ревізія бази даних
Проверка целостности, непротиворечивости, неизбыточности и других показателей базы данных, а также эффективности функционирования банка данных в целом, осуществляемая с помощью специальных проверочных программ.

English-Russian dictionary of information security . 2014.

Игры ⚽ Нужно решить контрольную?

Смотреть что такое "data base audit" в других словарях:

  • Audit log —   A computer file which contains details of all actions made which changed data in (a part of) the data base. Most of the details concern financial transactions but changes to system tables are also recorded in the audit log. See also Security… …   International financial encyclopaedia

  • Data center — An operation engineer overseeing a Network Operations Control Room of a data center. A data center (or data centre or datacentre or datacenter) is a facility used to house computer systems and associated components, such as telecommunications and …   Wikipedia

  • base document — 1. A document that serves as *audit evidence. Examples include *bank statements, *vendor invoices, and *general ledger extracts. 2. A document that includes the *population of data from which a *sample can be extracted for audit purposes …   Auditor's dictionary

  • Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… …   Wikipedia

  • Information technology audit — An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization s… …   Wikipedia

  • Consensus audit guidelines — The Twenty Critical Security Controls for Effective Cyber Defense (commonly called the Consensus Audit Guidelines or CAG) is a publication of best practice guidelines for computer security. The project was initiated early in 2008 as a response to …   Wikipedia

  • March Joint Air Reserve Base — Part of Air Force Reserve Command (AFRC) Located near: Riverside, Cal …   Wikipedia

  • Next-Generation Secure Computing Base — The Next Generation Secure Computing Base (NGSCB), formerly known as Palladium, is a software architecture designed by Microsoft which is expected to implement parts of the controversial Trusted Computing concept on future versions of the… …   Wikipedia

  • Trusted computing base — The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs occurring inside the TCB might jeopardize the security properties of… …   Wikipedia

  • Kadena Air Base — Infobox Airport name = Kadena Air Base nativename = Part of United States Pacific Air Forces (PACAF) nativename a = 嘉手納飛行場 nativename r = Kadena Hikōjō image width = caption = IATA = DNA ICAO = RODN type = Military owner = operator = United… …   Wikipedia

  • Buckley Air Force Base — Part of Air Force Space Command (AFSPC) Located in: Aurora, Colorado …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»