rule-based security policy
- rule-based security policy
information security
eng.rule-based security policy
rus.инструкционная методика безопасности
ukr.інструкційна методика безпеки
English-Russian dictionary of information security .
2014.
Смотреть что такое "rule-based security policy" в других словарях:
Center for Security Policy — infobox Organization name = Center for Security Policy size = abbreviation = motto = formation = 1988 type = National security Think Tank headquarters = location = leader title = leader name = website = http://www.centerforsecuritypolicy.org The… … Wikipedia
Common Foreign and Security Policy — This article deals with the workings of European Union foreign policy. For the relations between the European Union and third countries, see Foreign relations of the European Union. European Union This a … Wikipedia
Security-Enhanced Linux — The SELinux administrator in Fedora 8 Security Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, including United States Department of Defense style mandatory access controls,… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Rule of law — The rule of law, in its most basic form, is the principle that no one is above the law. Thomas Paine stated in his pamphlet Common Sense (1776): For as in absolute governments the king is law, so in free countries the law ought to be king; and… … Wikipedia
Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Organization for Security and Co-operation in Europe — OSCE redirects here. For other uses, see OSCE (disambiguation). Organization for Security and Co operation in Europe (OSCE) … Wikipedia
Organisation-based access control — In computer security, organization based access control (OrBAC) is an access control model first presented in 2003. The current approaches of the access control rest on the three entities (subject, action, object) to control the access the policy … Wikipedia
US Commission on National Security/21st Century — The U.S. Commission on National Security/21st Century (USCNS/21), also known as the Hart Rudman Commission or Hart Rudman Task Force on Homeland Security, was chartered by Secretary of Defense William Cohen in 1998 to provide a comprehensive… … Wikipedia