national security information - перевод на русский
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

national security information - перевод на русский

WIKIMEDIA LIST ARTICLE
National Information Systems Security Glossary
Найдено результатов: 3215
national security information      
информация, относящаяся к национальной безопасности
computer security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

компьютерная безопасность

Смотрите также

attack detection; information security; intruder detection

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

защита [безопасность] данных

защита данных от неавторизованного доступа, модификации или разрушения

Смотрите также

data control; data protection; information security; security

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
засекреченность (безопасность) данных; недоступность данных; защита данных
software security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
1) безопасность, обеспечиваемая программными средствами 2) защита программного обеспечения
security architecture         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
архитектура (структура) системы безопасности
computer security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
защита данных вычислительной машины
Defence Board         
  • Persian Gulf War]], 1991
  • The [[National Security Agency]] harvests personal data across the internet.
  • The [[SUPO]] headquarters in [[Punavuori]], [[Helsinki]]
DEFENSE AND MAINTENANCE OF A STATE THROUGH USE OF ALL POWERS AT THE STATE'S DISPOSAL
National Defence; National Security; National defence; Security sector; National Defense; National-defense; National security state; National security of Russia; National security matters; National defense; National security of Ukraine; National-security; Natl. security; State sec; Statesec; National security of India; National security theory; National security of the United Kingdom; Chairman of the Defence Board; Defence Board
совет обороны
national security         
  • Persian Gulf War]], 1991
  • The [[National Security Agency]] harvests personal data across the internet.
  • The [[SUPO]] headquarters in [[Punavuori]], [[Helsinki]]
DEFENSE AND MAINTENANCE OF A STATE THROUGH USE OF ALL POWERS AT THE STATE'S DISPOSAL
National Defence; National Security; National defence; Security sector; National Defense; National-defense; National security state; National security of Russia; National security matters; National defense; National security of Ukraine; National-security; Natl. security; State sec; Statesec; National security of India; National security theory; National security of the United Kingdom; Chairman of the Defence Board; Defence Board
национальная безопасность
infosecurity         
  • The [[onion model]] of defense in depth
  • Ministry of Defence]]
  • [[Privacy International]] 2007 privacy ranking<br />green: Protections and safeguards<br />red: Endemic surveillance societies
PROTECTING INFORMATION BY MITIGATING INFORMATION RISKS
Information systems security; INFOSEC; Message integrity; CIA triad; Infosec; Infosecurity; Information Security; CIA Triad; Information security policies; Information security policy; Information security policy documents; CIA criteria; CIA model; CIA-model; Info sec; Information Systems Security; Security triad; Information protection; Draft:Information security analyst; Information security analyst; Draft:Information Security analyst; Document security; History of information security
безопасность информации

Определение

Национальная ассоциация промышленников
(НАП; National Association of Manufacturers)

крупнейшая организация монополистов США. Основана в 1895. Объединяет около 30 тыс. фирм (1973), включая наиболее могущественные концерны страны. НАП играет большую роль в системе политической и общественной жизни США. Руководящие органы НАП состоят из Совета директоров, президента, группы постоянных, региональных и почётных вице-президентов, а также около 20 постоянных комитетов, анализирующих и разрабатывающих рекомендации по многим вопросам и проблемам, входящим в сферу непосредственной деятельности государственного аппарата США (внешняя политика, экономическое положение страны и прогнозирование, международная экономическая деятельность, социальные изменения внутри страны, связь с общественностью и пути воздействия на неё, профсоюзы и рабочее движение, налогообложение и др.). Штаб-квартира НАП находится в Нью-Йорке; под её руководством действует ряд региональных центров ассоциации.

Википедия

National Information Assurance Glossary

Committee on National Security Systems Instruction No. 4009, National Information Assurance Glossary, published by the United States federal government, is an unclassified glossary of Information security terms intended to provide a common vocabulary for discussing Information Assurance concepts.

The glossary was previously published as the National Information Systems Security Glossary (NSTISSI No. 4009) by the National Security Telecommunications and Information Systems Security Committee (NSTISSC). Under Executive Order (E.O.) 13231 of October 16, 2001, Critical Infrastructure Protection in the Information Age, the President George W. Bush redesignated the National Security Telecommunications and Information Systems Security Committee (NSTISSC) as the Committee on National Security Systems (CNSS).

The most recent version was revised April 26, 2010.

Как переводится national security information на Русский язык