- information encryption
- Безопасность: криптографическое закрытие информации, шифрование информации
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Information Rights Management — Information Rights Management(IRM) is a term that applies to a technology which protects sensitive information from unauthorised access. It is sometimes referred to as E DRM, Enterprise Digital Rights Management. This can cause confusion because… … Wikipedia
encryption — n. the process of converting messages in ordinary language, or other information into a secret coded form that cannot be interpreted without knowing the secret method for interpretation, called the key. Note: Encryption is used commonly to allow… … The Collaborative International Dictionary of English
Information leakage — happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless. For example, when designing an encrypted instant messaging network, a network engineer without the capacity… … Wikipedia
encryption — n. The practice of converting information into code that can only be deciphered with a key. The Essential Law Dictionary. Sphinx Publishing, An imprint of Sourcebooks, Inc. Amy Hackney Blackwell. 2008. encryption … Law dictionary
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
Information theoretic security — A cryptosystem is information theoretically secure if its security derives purely from information theory. That is, it is secure even when the adversary has unbounded computing power. An example of an information theoretically secure cryptosystem … Wikipedia
encryption — encrypt en‧crypt [ɪnˈkrɪpt] verb [transitive] COMPUTING to write information in the form of code, especially to prevent certain people from being able to use it: • The program encrypts your password when you use the software for the first time.… … Financial and business terms
information theory — the mathematical theory concerned with the content, transmission, storage, and retrieval of information, usually in the form of messages or data, and esp. by means of computers. [1945 50] * * * ▪ mathematics Introduction a mathematical… … Universalium