- information security practices
- Деловая лексика: правила информационной безопасности
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Information Security Forum — The Information Security Forum (ISF) is an international, independent, not for profit organization dedicated to benchmarking and best practices in information security. It was established in 1989 as the European Security Forum but expanded its… … Wikipedia
Information security professionalism — is the set of knowledge that people working in Information security and similar fields (Information Assurance and Computer security) should have and eventually demonstrate through certifications from well respected organizations. It also… … Wikipedia
Security Practices and Research Student Association — The Security Practices and Research Student Association (SPARSA) is a Rochester Institute of Technology student run organization that addresses security related issues and how these issues affect multiple majors and disciplines. The ultimate goal … Wikipedia
Physical information security — is concerned with physically protecting data and means to access that data (apart from protecting it electronically). Many individuals and companies place importance in protecting their information from a software and/or network perspective, but… … Wikipedia
Enterprise Information Security Architecture — (EISA) is a part of enterprise architecture focusing on information security throughout the enterprise. Definition Enterprise Information Security Architecture (EISA) is the practice of applying a comprehensive and rigorous method for describing… … Wikipedia
Certified Information Security Manager — (CISM) is a certification for information security managers awarded by ISACA (formerly the Information Systems Audit and Control Association). To gain the certifications, individuals must pass a written examination and have at least five years of … Wikipedia
Holistic Information Security Practitioner — The Holistic Information Security Practitioner certification course is an integration course that provides practical education on the integration of best practices for Information Security Management, Information Systems Auditing, and multiple… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… … Wikipedia
Security Information Management — (SIM) is the industry specific term in computer security referring to the collection of data (typically log files; e.g. eventlogs) into a central repository for trend analysis. SIM is a relatively new idea, pioneered in 1999 by a small company… … Wikipedia