intrusion monitoring

intrusion monitoring
1) Механика: контроль за проникновением
2) Робототехника: контроль за проникновением (человека в опасную зону действий робота)
3) Безопасность: контроль мест возможного проникновения в охраняемую зону или на охраняемый объект

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Нужен реферат?

Смотреть что такое "intrusion monitoring" в других словарях:

  • Intrusion-prevention system — An intrusion prevention system is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real time, to block or prevent those activities. Network based IPS, for example, will… …   Wikipedia

  • Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop …   Wikipedia

  • Host-based intrusion detection system — A host based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the internals of a computing system rather than on its external interfaces (as a network based intrusion detection system (NIDS) would do) …   Wikipedia

  • Protocol-based intrusion detection system — A protocol based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system. A PIDS will monitor the… …   Wikipedia

  • Application protocol-based intrusion detection system — An application protocol based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific application protocol or protocols in use by the computing system. Overview An APIDS will… …   Wikipedia

  • Saltwater intrusion — is a process that occurs in virtually all coastal aquifers, where they are in hydraulic continuity with seawater. It consists in salt water (from the sea)flowing inland in freshwater aquifers. This behaviour is caused by the fact that sea water… …   Wikipedia

  • Network Monitoring Interface Card — A network monitoring interface card or NMIC is similar to a network card (NIC). However, unlike a standard network card, an NMIC is designed to passively (and silently) listen on a network. At a functional level, an NMIC may differ from a NIC, in …   Wikipedia

  • Network intrusion detection system — A Network Intrusion Detection System (NIDS) is an intrusion detection system that tries to detect malicious activity such as denial of service attacks, port scans or even attempts to crack into computers by Network Security Monitoring (NSM) of… …   Wikipedia

  • Max Headroom broadcast signal intrusion incident — The Max Headroom broadcast signal intrusion incident was a television signal hijacking in Chicago, Illinois, on the evening of November 22, 1987; it is an example of what is known in the television business as broadcast signal intrusion. The… …   Wikipedia

  • Cisco Security Monitoring, Analysis, and Response System — Cisco MARS Company / developer Cisco Systems Working state Current Source model Closed source Latest stable release Cisco Security MARS Appliance 6.0.8 / August 4, 2010 Available language(s) …   Wikipedia

  • Max Headroom broadcast signal intrusion — An unidentified man dressed to resemble Max Headroom was visible in the intruding broadcast. Participants Unidentified Lo …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»