rule-based security policy

rule-based security policy
information security
eng.rule-based security policy
rus.инструкционная методика безопасности
ukr.інструкційна методика безпеки
Основана на общих правилах, обязательных для всех пользователей сети.

English-Russian dictionary of information security . 2014.

Игры ⚽ Нужна курсовая?

Смотреть что такое "rule-based security policy" в других словарях:

  • Center for Security Policy — infobox Organization name = Center for Security Policy size = abbreviation = motto = formation = 1988 type = National security Think Tank headquarters = location = leader title = leader name = website = http://www.centerforsecuritypolicy.org The… …   Wikipedia

  • Common Foreign and Security Policy — This article deals with the workings of European Union foreign policy. For the relations between the European Union and third countries, see Foreign relations of the European Union. European Union This a …   Wikipedia

  • Security-Enhanced Linux — The SELinux administrator in Fedora 8 Security Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, including United States Department of Defense style mandatory access controls,… …   Wikipedia

  • Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… …   Wikipedia

  • Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro …   Wikipedia

  • Rule of law — The rule of law, in its most basic form, is the principle that no one is above the law. Thomas Paine stated in his pamphlet Common Sense (1776): For as in absolute governments the king is law, so in free countries the law ought to be king; and… …   Wikipedia

  • Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Organization for Security and Co-operation in Europe — OSCE redirects here. For other uses, see OSCE (disambiguation). Organization for Security and Co operation in Europe (OSCE) …   Wikipedia

  • Organisation-based access control — In computer security, organization based access control (OrBAC) is an access control model first presented in 2003. The current approaches of the access control rest on the three entities (subject, action, object) to control the access the policy …   Wikipedia

  • US Commission on National Security/21st Century — The U.S. Commission on National Security/21st Century (USCNS/21), also known as the Hart Rudman Commission or Hart Rudman Task Force on Homeland Security, was chartered by Secretary of Defense William Cohen in 1998 to provide a comprehensive… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»