data security engineering - перевод на русский
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

data security engineering - перевод на русский

SPECIALIZED FIELD OF SCIENTIFIC ENGINEERING THAT FOCUSES ON THE SECURITY AND SAFETY ASPECTS IN THE DESIGN, IMPLEMENTATION AND OPERATION OF SYSTEMS
Security stance; Information systems security engineering; Default permit; Security engineer; Information Systems Security Engineering; Security Engineering Officer; Product security
  • Canadian Embassy in Washington, D.C. showing planters being used as vehicle barriers, and barriers and gates along the vehicle entrance
Найдено результатов: 3541
data security engineering      
техника обеспечения безопасности данных, техника защиты данных
security engineering         
техника обеспечения безопасности
computer security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

компьютерная безопасность

Смотрите также

attack detection; information security; intruder detection

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

защита [безопасность] данных

защита данных от неавторизованного доступа, модификации или разрушения

Смотрите также

data control; data protection; information security; security

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
засекреченность (безопасность) данных; недоступность данных; защита данных
engineering         
  • A water-powered [[mine hoist]] used for raising ore, ca. 1556
  • A drawing for a [[steam locomotive]]. Engineering is applied to [[design]], with emphasis on function and the utilization of mathematics and science.
  • fluid flow]] and the [[heat equation]]s.
  • rotor and stator]] as well as the [[steam cycle]] all need to be carefully designed and optimized.
  • Radar, [[GPS]], [[lidar]], ... are all combined to provide proper navigation and [[obstacle avoidance]] (vehicle developed for 2007 [[DARPA Urban Challenge]])
  • F}}
  • Genetically engineered mice expressing [[green fluorescent protein]], which glows green under blue light. The central mouse is [[wild-type]].
  • Relief map of the [[Citadel of Lille]], designed in 1668 by [[Vauban]], the foremost military engineer of his age.
  • Offshore platform, [[Gulf of Mexico]]
  • [[Hoover Dam]]
  • Kismet]] can produce a range of facial expressions.
  • [[Leonardo da Vinci]], seen here in a self-portrait, has been described as the epitome of the artist/engineer.<ref name="Bjerklie, David"/> He is also known for his studies on [[human anatomy]] and [[physiology]].
  • The ''[[InSight]]'' lander with solar panels deployed in a cleanroom
  • aqueducts]] to bring a steady supply of clean and fresh water to cities and towns in the empire.
  • The [[International Space Station]] is used to conduct science experiments in space
  • The application of the steam engine allowed coke to be substituted for charcoal in iron making, lowering the cost of iron, which provided engineers with a new material for building bridges.  This bridge was made of [[cast iron]], which was soon displaced by less brittle [[wrought iron]] as a structural material
  • Engineers, scientists and technicians at work on target positioner inside [[National Ignition Facility]] (NIF) target chamber
  • Graphic representation of a minute fraction of the WWW, demonstrating [[hyperlink]]s
APPLIED SCIENCE
Engineered; Engeneering; Enginering; Graduate Diploma in Engineering; Technical science; Engineerig; Engineering (profession); Engineering (practice); Engineering (skill); Enginreeing; Science and engineering; Science and Engineering; Engineering subjects; Engineering branch
software security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
1) безопасность, обеспечиваемая программными средствами 2) защита программного обеспечения
security architecture         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
архитектура (структура) системы безопасности
engineering         
  • A water-powered [[mine hoist]] used for raising ore, ca. 1556
  • A drawing for a [[steam locomotive]]. Engineering is applied to [[design]], with emphasis on function and the utilization of mathematics and science.
  • fluid flow]] and the [[heat equation]]s.
  • rotor and stator]] as well as the [[steam cycle]] all need to be carefully designed and optimized.
  • Radar, [[GPS]], [[lidar]], ... are all combined to provide proper navigation and [[obstacle avoidance]] (vehicle developed for 2007 [[DARPA Urban Challenge]])
  • F}}
  • Genetically engineered mice expressing [[green fluorescent protein]], which glows green under blue light. The central mouse is [[wild-type]].
  • Relief map of the [[Citadel of Lille]], designed in 1668 by [[Vauban]], the foremost military engineer of his age.
  • Offshore platform, [[Gulf of Mexico]]
  • [[Hoover Dam]]
  • Kismet]] can produce a range of facial expressions.
  • [[Leonardo da Vinci]], seen here in a self-portrait, has been described as the epitome of the artist/engineer.<ref name="Bjerklie, David"/> He is also known for his studies on [[human anatomy]] and [[physiology]].
  • The ''[[InSight]]'' lander with solar panels deployed in a cleanroom
  • aqueducts]] to bring a steady supply of clean and fresh water to cities and towns in the empire.
  • The [[International Space Station]] is used to conduct science experiments in space
  • The application of the steam engine allowed coke to be substituted for charcoal in iron making, lowering the cost of iron, which provided engineers with a new material for building bridges.  This bridge was made of [[cast iron]], which was soon displaced by less brittle [[wrought iron]] as a structural material
  • Engineers, scientists and technicians at work on target positioner inside [[National Ignition Facility]] (NIF) target chamber
  • Graphic representation of a minute fraction of the WWW, demonstrating [[hyperlink]]s
APPLIED SCIENCE
Engineered; Engeneering; Enginering; Graduate Diploma in Engineering; Technical science; Engineerig; Engineering (profession); Engineering (practice); Engineering (skill); Enginreeing; Science and engineering; Science and Engineering; Engineering subjects; Engineering branch
engineering         
  • A water-powered [[mine hoist]] used for raising ore, ca. 1556
  • A drawing for a [[steam locomotive]]. Engineering is applied to [[design]], with emphasis on function and the utilization of mathematics and science.
  • fluid flow]] and the [[heat equation]]s.
  • rotor and stator]] as well as the [[steam cycle]] all need to be carefully designed and optimized.
  • Radar, [[GPS]], [[lidar]], ... are all combined to provide proper navigation and [[obstacle avoidance]] (vehicle developed for 2007 [[DARPA Urban Challenge]])
  • F}}
  • Genetically engineered mice expressing [[green fluorescent protein]], which glows green under blue light. The central mouse is [[wild-type]].
  • Relief map of the [[Citadel of Lille]], designed in 1668 by [[Vauban]], the foremost military engineer of his age.
  • Offshore platform, [[Gulf of Mexico]]
  • [[Hoover Dam]]
  • Kismet]] can produce a range of facial expressions.
  • [[Leonardo da Vinci]], seen here in a self-portrait, has been described as the epitome of the artist/engineer.<ref name="Bjerklie, David"/> He is also known for his studies on [[human anatomy]] and [[physiology]].
  • The ''[[InSight]]'' lander with solar panels deployed in a cleanroom
  • aqueducts]] to bring a steady supply of clean and fresh water to cities and towns in the empire.
  • The [[International Space Station]] is used to conduct science experiments in space
  • The application of the steam engine allowed coke to be substituted for charcoal in iron making, lowering the cost of iron, which provided engineers with a new material for building bridges.  This bridge was made of [[cast iron]], which was soon displaced by less brittle [[wrought iron]] as a structural material
  • Engineers, scientists and technicians at work on target positioner inside [[National Ignition Facility]] (NIF) target chamber
  • Graphic representation of a minute fraction of the WWW, demonstrating [[hyperlink]]s
APPLIED SCIENCE
Engineered; Engeneering; Enginering; Graduate Diploma in Engineering; Technical science; Engineerig; Engineering (profession); Engineering (practice); Engineering (skill); Enginreeing; Science and engineering; Science and Engineering; Engineering subjects; Engineering branch

Определение

БОИНГ
(Boeing) Уильям Эдуард (1881-1956) , американский авиаконструктор и промышленник. В 1916 основал фирму "Пасифик аэро продактс" (Pacific Aero Products), сменившую название через несколько месяцев на "Боинг эрплейн" (Boeng Airplane Co.) и выпускавшую до 1927 в основном военные самолеты. Организовал почтовые авиаперевозки, в 1926 создал свою авиатранспортную компанию. Его имя носит современная фирма "Боинг".

Википедия

Security engineering

Security engineering is the process of incorporating security controls into an information system so that the controls become an integral part of the system’s operational capabilities. It is similar to other systems engineering activities in that its primary motivation is to support the delivery of engineering solutions that satisfy pre-defined functional and user requirements, but it has the added dimension of preventing misuse and malicious behavior. Those constraints and restrictions are often asserted as a security policy.

In one form or another, security engineering has existed as an informal field of study for several centuries. For example, the fields of locksmithing and security printing have been around for many years. The concerns for modern security engineering and computer systems were first solidified in a RAND paper from 1967, "Security and Privacy in Computer Systems" by Willis H. Ware. This paper, later expanded in 1979, provided many of the fundamental information security concepts, labelled today as Cybersecurity, that impact modern computer systems, from cloud implementations to embedded IoT.

Recent catastrophic events, most notably 9/11, have made security engineering quickly become a rapidly-growing field. In fact, in a report completed in 2006, it was estimated that the global security industry was valued at US $150 billion.

Security engineering involves aspects of social science, psychology (such as designing a system to "fail well", instead of trying to eliminate all sources of error), and economics as well as physics, chemistry, mathematics, criminology architecture, and landscaping. Some of the techniques used, such as fault tree analysis, are derived from safety engineering.

Other techniques such as cryptography were previously restricted to military applications. One of the pioneers of establishing security engineering as a formal field of study is Ross Anderson.

Как переводится data security engineering на Русский язык