DictionaryForumContacts

   English
Terms for subject Microsoft containing security | all forms | exact matches only
EnglishUkrainian
absolute security descriptorабсолютний дескриптор безпеки (A security descriptor structure that contains pointers to the security information associated with an object)
callback securityзахист виклику (A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated)
code access security CAS policy A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissionsполітика безпеки доступу до коду (CAS)
enhanced securityпосилена безпека (A security type that helps prevent unauthorized persons from discerning that a user is going to the Windows Live sign-in page. Otherwise, an unauthorized person might be able to intercept and manipulate the code on the sign-in page, which could result in user information being transmitted to an unauthorized website)
IEEE 802.1X security standardстандарт безпеки IEEE 802.1X (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks)
mail-enabled universal security groupуніверсальна поштова група безпеки (A group of recipients that are created to expedite the mass e-mailing of messages and other information. Unlike a mail-enabled universal distribution group, a mail-enabled USG can also be used to assign permissions. When e-mail is sent to a mail-enabled USG, all members of that group receive a copy of the message)
Microsoft Safety and Security CenterЦентр Microsoft із захисту та безпеки (The Microsoft website of information on and resources for computer security, digital privacy, and online safety)
Microsoft Safety & Security CenterЦентр Microsoft із захисту та безпеки (The Microsoft website of information on and resources for computer security, digital privacy, and online safety)
Microsoft Security Response Centerцентр Microsoft Security Response Center (A Microsoft business unit responsible for investigation and remediation of all security vulnerabilities involving Microsoft products)
network security keyмережевий ключ безпеки (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
security administratorадміністратор безпеки (An administrative user who has been granted the permissions to add, remove, and modify administrative users and their administrative assignments)
security breachпорушення вимог безпеки (An event that compromises the security of a computer, application, network or other resource)
Security Configuration Wizardмайстер настроювання безпеки (A tool that automates security best practices to reduce the attack surface for a server. The SCW was introduced with Windows Server 2003 Service Pack 1)
security contextконтекст безпеки (The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object)
security-criticalвирішальний для безпеки (Pertaining to a type or member that accesses secure resources and can only be used by fully trusted code in the .NET Framework)
security descriptorдескриптор безпеки (A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited)
security disablerдеактиватор захисту (A type of Trojan that disables security settings or products such as antivirus software)
security-edge gatewayбрандмауер (A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules)
security-enabled workgroupзахищена робоча група (An Access workgroup in which users log on with a user name and password and in which access to database objects is restricted according to permissions granted to specific user accounts and groups)
security filteringфільтрація захисту даних (A method of applying the settings of a Group Policy object (GPO) based on security principals)
security groupгрупа безпеки (A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group)
security IDкод безпеки (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created)
security identifierідентифікатор безпеки (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created)
security logжурнал безпеки (An event log containing information on security events that are specified in the audit policy)
security principalпринципал безпеки (In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources)
security roleроль безпеки (A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system)
security support componentкомпонент підтримки безпеки (A hardware-based security facility that implements cryptosystems, random number generation, and key storage)
Security Support Provider Interfaceінтерфейс постачальника підтримки безпеки (A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details)
security token serviceслужба маркерів безпеки (A Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature) In Active Directory Federation Services (ADFS), the Federation Service is a security token service)
security trimmingфільтрування за ролями безпеки (The process of limiting search results based on the identity of the user who submitted the query)
security updateоновлення системи безпеки (" A broadly released fix for a product-specific security-related vulnerability. Security vulnerabilities are rated based on their severity which is indicated in the Microsoft's security bulletin as "critical," "important," "moderate, or "low.")
security update packageпакет оновлень для системи безпеки (" A broadly released fix for a product-specific security-related vulnerability. Security vulnerabilities are rated based on their severity which is indicated in the Microsoft's security bulletin as "critical," "important," "moderate, or "low.")
security vulnerabilityуразливість системи безпеки (A vulnerability in a product that is addressed by a Microsoft security update and security bulletin or a service pack)
SIM securityзахист SIM-картки (A toggle switch that you tap to enter a SIM PIN)
Transport Layer Securityпротокол TLS (A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol)
Windows Firewall with Advanced Securityбрандмауер Windows з додатковим захистом (A snap-in which allows users to configure policies that provide enhanced network security for Windows computers)