security sensitive information - перевод на русский
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

security sensitive information - перевод на русский

CATEGORY OF SENSITIVE INFORMATION UNDER THE UNITED STATES GOVERNMENT'S INFORMATION SHARING AND CONTROL RULES
Sensitive Security Information (SSI)
  • A cover sheet, like those found on Confidential, Secret, and Top Secret documents, but for Sensitive Security Information.
Найдено результатов: 1913
security sensitive information      
информация, относящаяся к (службе) безопасности
sensitive information         
INFORMATION OR KNOWLEDGE THAT MIGHT RESULT IN LOSS OF AN ADVANTAGE OR LEVEL OF SECURITY IF DISCLOSED TO OTHERS
Sensitive information; Sensitivity indicator; Sensitivity (information); Sensitive data

общая лексика

важная [значимая, секретная, конфиденциальная, критичная] информация

информация, потеря, раскрытие или уничтожение которой по тем или иным причинам нежелательны для бизнеса, функционирования системы, или её владельца

Смотрите также

privileged information

sensitive data         
INFORMATION OR KNOWLEDGE THAT MIGHT RESULT IN LOSS OF AN ADVANTAGE OR LEVEL OF SECURITY IF DISCLOSED TO OTHERS
Sensitive information; Sensitivity indicator; Sensitivity (information); Sensitive data
конфиденциальные данные; данные, требующие защиты
sensitive information         
INFORMATION OR KNOWLEDGE THAT MIGHT RESULT IN LOSS OF AN ADVANTAGE OR LEVEL OF SECURITY IF DISCLOSED TO OTHERS
Sensitive information; Sensitivity indicator; Sensitivity (information); Sensitive data
1) информация, содержащая важные сведения, ценная информация; конфиденциальная информация 2) информация, требующая защиты, уязвимая информация; критичная информация
sensitive information         
INFORMATION OR KNOWLEDGE THAT MIGHT RESULT IN LOSS OF AN ADVANTAGE OR LEVEL OF SECURITY IF DISCLOSED TO OTHERS
Sensitive information; Sensitivity indicator; Sensitivity (information); Sensitive data
секретные сведения, засекреченная информация
computer security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

компьютерная безопасность

Смотрите также

attack detection; information security; intruder detection

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

защита [безопасность] данных

защита данных от неавторизованного доступа, модификации или разрушения

Смотрите также

data control; data protection; information security; security

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
засекреченность (безопасность) данных; недоступность данных; защита данных
software security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
1) безопасность, обеспечиваемая программными средствами 2) защита программного обеспечения
security architecture         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
архитектура (структура) системы безопасности

Определение

Поиск информационный

Википедия

Sensitive Security Information

Sensitive Security Information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI is information obtained in the conduct of security activities whose public disclosure would, in the judgement of specified government agencies, harm transportation security, be an unwarranted invasion of privacy, or reveal trade secrets or privileged or confidential information. SSI is governed by Title 49 of the Code of Federal Regulations (CFR), parts 15 and 1520.

SSI was created to help share transportation-related information deemed too revealing for public disclosure between Federal government agencies; State, local, tribal, and foreign governments; U.S. and foreign air carriers; and others.

SSI is not a form of classification under Executive Order 12958 as amended; that is, it is not classified national security information in the sense of Top Secret, Secret or Confidential.

Как переводится security sensitive information на Русский язык