OSI security architecture - перевод на Английский
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

OSI security architecture - перевод на Английский

SCHEME FOR SPECIFYING AND ENFORCING SECURITY POLICIES; MAY BE FOUNDED UPON A FORMAL MODEL OF ACCESS RIGHTS, A MODEL OF COMPUTATION, A MODEL OF DISTRIBUTED COMPUTING, OR NO THEORETICAL GROUNDING AT ALL; IMPLEMENTED THROUGH A COMPUTER SECURITY POLICY
Security Architecture and Models; Security Architecture & Models
Найдено результатов: 1568
OSI security architecture      
архитектура (системы) безопасности Международной организации по стандартизации OSI (ОСИ)
computer security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

компьютерная безопасность

Смотрите также

attack detection; information security; intruder detection

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

защита [безопасность] данных

защита данных от неавторизованного доступа, модификации или разрушения

Смотрите также

data control; data protection; information security; security

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
засекреченность (безопасность) данных; недоступность данных; защита данных
software security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
1) безопасность, обеспечиваемая программными средствами 2) защита программного обеспечения
security architecture         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
архитектура (структура) системы безопасности
OSI         
WIKIMEDIA DISAMBIGUATION PAGE
O.S.I.; Osi; OSI (disambiguation); Osi (disambiguation)

общая лексика

Open Systems Interconnection

взаимодействие открытых систем, эталонная модель OSI

семиуровневая модель протоколов передачи данных, утверждённая ISO в 1984 г., для обеспечения взаимодействия открытых систем. В модели OSI все сетевые функции разделены на уровни таким образом, что все вышележащие уровни пользуются услугами нижележащих через стандартизованные интерфейсы. Такая структура позволяет модифицировать любой из уровней, не затрагивая остальные. Уровни OSI снизу вверх: физический (physical layer), канальный (data link layer), сетевой (network layer), транспортный (transport layer), сеансовый (session layer), представления данных (presentation layer) и прикладной (application layer). Поскольку уровни с первого по третий управляют физической доставкой данных по сети, то их иногда называют уровнями среды передачи данных (media layers)

комитет OSI

международная организация под спонсорством ISO, занимающаяся разработкой международных стандартов в области передачи данных

сокращение

[oil well, shut-in] нефтяная скважина с закрытым устьем

Смотрите также

protocol

Open Systems Interconnection         
MODEL WITH 7 LAYERS TO DESCRIBE COMMUNICATION SYSTEMS
Open Systems Interconnection; Open Systems Interconnection Specification; Open Systems Interconnection--Reference Model; OSI seven-layer model; Open systems interconnection; OSI seven layer model; OSI Model; OSI reference model; ISO/OSI Reference Model; Osi model; Seven-layer OSI model; Open System Interconnection; 7 layer model; X.200; Open systems interconnect; Open Systems Interconnect; Osi 7 layer model; Layer 7; OSI stack; OSI layer; Osi layer; OSI RM; N-Facility; 7 layer osi; Osi stack; OSI Reference Model; TP0-TP4; OSI protocol suite; OSI-model; Osi layers; OIS Model; ISO model; ISO/OSI; 7 Layer OSI Model; Seven-layer model; ISO 9542; OSI 7-layer model; ISO OSI; Osi reference model; OSI layers (mnemonics); OSI layers; 7 layer; OSI protocol; ISO 7498; OSI/ISO; 7 Layer Model; OSI Layer; ISO/IEC 7498-1; Open Systems Interconnection model; Layer 2.5; Iso osi; ISO/IEC 7498; X.225; ISO OSI reference model; ISO OSI model; ISO OSI Reference Model; ISO OSI Model; ISO/OSI reference model; ISO/OSI model; ISO/OSI Model; Open Systems Interconnection Model; ISO Open Systems Interconnection Model; Open Systems Interconnection Reference Model; ISO Open Systems Interconnection Reference Model; ISO Open Systems Interconnection model; Open Systems Interconnection reference model; ISO Open Systems Interconnection reference model; Open systems interconnection model; Open systems interconnection reference model; ISO open systems interconnection model; ISO open systems interconnection reference model; ISO-OSI Reference Model
см. OSI
seven-layer model         
MODEL WITH 7 LAYERS TO DESCRIBE COMMUNICATION SYSTEMS
Open Systems Interconnection; Open Systems Interconnection Specification; Open Systems Interconnection--Reference Model; OSI seven-layer model; Open systems interconnection; OSI seven layer model; OSI Model; OSI reference model; ISO/OSI Reference Model; Osi model; Seven-layer OSI model; Open System Interconnection; 7 layer model; X.200; Open systems interconnect; Open Systems Interconnect; Osi 7 layer model; Layer 7; OSI stack; OSI layer; Osi layer; OSI RM; N-Facility; 7 layer osi; Osi stack; OSI Reference Model; TP0-TP4; OSI protocol suite; OSI-model; Osi layers; OIS Model; ISO model; ISO/OSI; 7 Layer OSI Model; Seven-layer model; ISO 9542; OSI 7-layer model; ISO OSI; Osi reference model; OSI layers (mnemonics); OSI layers; 7 layer; OSI protocol; ISO 7498; OSI/ISO; 7 Layer Model; OSI Layer; ISO/IEC 7498-1; Open Systems Interconnection model; Layer 2.5; Iso osi; ISO/IEC 7498; X.225; ISO OSI reference model; ISO OSI model; ISO OSI Reference Model; ISO OSI Model; ISO/OSI reference model; ISO/OSI model; ISO/OSI Model; Open Systems Interconnection Model; ISO Open Systems Interconnection Model; Open Systems Interconnection Reference Model; ISO Open Systems Interconnection Reference Model; ISO Open Systems Interconnection model; Open Systems Interconnection reference model; ISO Open Systems Interconnection reference model; Open systems interconnection model; Open systems interconnection reference model; ISO open systems interconnection model; ISO open systems interconnection reference model; ISO-OSI Reference Model
семиуровневая модель соединений открытых систем (Международной организации по стандартизации)
Open System Interconnection         
MODEL WITH 7 LAYERS TO DESCRIBE COMMUNICATION SYSTEMS
Open Systems Interconnection; Open Systems Interconnection Specification; Open Systems Interconnection--Reference Model; OSI seven-layer model; Open systems interconnection; OSI seven layer model; OSI Model; OSI reference model; ISO/OSI Reference Model; Osi model; Seven-layer OSI model; Open System Interconnection; 7 layer model; X.200; Open systems interconnect; Open Systems Interconnect; Osi 7 layer model; Layer 7; OSI stack; OSI layer; Osi layer; OSI RM; N-Facility; 7 layer osi; Osi stack; OSI Reference Model; TP0-TP4; OSI protocol suite; OSI-model; Osi layers; OIS Model; ISO model; ISO/OSI; 7 Layer OSI Model; Seven-layer model; ISO 9542; OSI 7-layer model; ISO OSI; Osi reference model; OSI layers (mnemonics); OSI layers; 7 layer; OSI protocol; ISO 7498; OSI/ISO; 7 Layer Model; OSI Layer; ISO/IEC 7498-1; Open Systems Interconnection model; Layer 2.5; Iso osi; ISO/IEC 7498; X.225; ISO OSI reference model; ISO OSI model; ISO OSI Reference Model; ISO OSI Model; ISO/OSI reference model; ISO/OSI model; ISO/OSI Model; Open Systems Interconnection Model; ISO Open Systems Interconnection Model; Open Systems Interconnection Reference Model; ISO Open Systems Interconnection Reference Model; ISO Open Systems Interconnection model; Open Systems Interconnection reference model; ISO Open Systems Interconnection reference model; Open systems interconnection model; Open systems interconnection reference model; ISO open systems interconnection model; ISO open systems interconnection reference model; ISO-OSI Reference Model
See: OSI

Определение

АРХИТЕКТУРА
ы, мн. нет, ж.
1. Строительное искусство, зодчество. Средневековая а.
2. Стиль постройки. А. здания. Архитектурный - относящийся к архитектуре.

Википедия

Computer security model

A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. A computer security model is implemented through a computer security policy.

For a more complete list of available articles on specific security models, see Category:Computer security models.

Как переводится OSI security architecture на Русский язык