- tamper-resistance (of a system)
- Химическое оружие: защищённость от несанкционированного вмешательства (системы)
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Tamper resistance — is resistance to by either the normal users of a product, package, or system or others with physical access to it. There are many reasons for employing tamper resistance.Tamper resistance ranges from simple features like screws with special heads … Wikipedia
Tamper-evident — describes a device or process that makes unauthorised access to the protected object easily detected. This may take the form of seals, markings or other techniques.TamperingTampering involves the deliberate altering or adulteration of a product,… … Wikipedia
Self-certifying File System — In computing, Self certifying File System (SFS) is a global and decentralized, distributed file system for Unix like operating systems, while also providing transparent encryption of communications as well as authentication. It aims to be the… … Wikipedia
Ballast tamper — A ballast tamper or tamping machine is a machine used to pack (or tamp) the track ballast under railway tracks to make the tracks more durable. Prior to the introduction of mechanical tampers, this task was done by manual labour with the help of… … Wikipedia
Publius Publishing System — Publius is (was?) a web protocol developed by [http://www.cs.nyu.edu/ waldman/ Waldman] , Rubin [http://lorrie.cranor.org/ Cranor] for allowing individuals the ability to publish information on the web anonymously and with a high guarantee that… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Package testing — Military shipping container being drop tested Testing … Wikipedia
Tamperproofing — is a term sometimes used for a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, time, etc … Wikipedia
Sécurité matérielle des cartes à puce — La sécurité matérielle des cartes à puce et des autres microcontrôleurs est l un des éléments clefs de la sécurité des informations sensibles qu ils manipulent. La littérature scientifique a produit un grand nombre de publications visant à… … Wikipédia en Français
Secure cryptoprocessor — A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. The purpose of… … Wikipedia
Closure (container) — For other uses, see Closure (disambiguation). An aluminum bottle with a threaded aluminum screw closure Closures are devices and techniques used to close or seal a bottle, jug, jar, tube, can, etc. Closures can be a cap, cover, lid, plug, etc.… … Wikipedia