- tampering detection
- Техника: обнаружение умышленного нарушения настройки
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Host-based intrusion detection system — A host based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the internals of a computing system rather than on its external interfaces (as a network based intrusion detection system (NIDS) would do) … Wikipedia
Electronic signature — The term electronic signature has several meanings. Among the more expansive is that given by US law, influenced by ABA committee white papers and the uniform law promulgated by the National Conference of Commissioners on Uniform State Laws… … Wikipedia
PERMIS — (PrivilEge and Role Management Infrastructure Standards) is a sophisticated policy based authorisation system that implements an enhanced version of the U.S. National Institute of Standards and Technology (NIST) standard Role Based Access Control … Wikipedia
Crisis management — is the process by which an organization deals with a major event that threatens to harm the organization, its stakeholders, or the general public. The study of crisis management originated with the large scale industrial and environmental… … Wikipedia
Burglar alarm — Silent alarm redirects here. For the album, see Silent Alarm (album). Burglar (or intrusion), fire and safety alarms are all electronic today. Sensors are connected to a control unit via a low voltage hardwire or narrowband RF signal which is… … Wikipedia
Electricity meter — Typical North American domestic analog electricity meter … Wikipedia
Drug test — For other uses, see Drug testing (disambiguation). Drug test Diagnostics To minimize opportunities for tampering, a direct line of sight between the observer and the specimen bottle must be maintained during collection of a urine sample … Wikipedia
Write Once Read Many — Write Once, Read Many (alternatively Write One, Read Multiple or Write Once, Read Mostly or WORM) refers to computer data storage systems, data storage devices, and data storage media that can be written to once, but read from multiple times. [… … Wikipedia
Automated teller machine — cash machine redirects here. For the Hard Fi song, see Cash Machine. An NCR Personas 75 Series interior, multi function ATM in the United States … Wikipedia
Security lighting — In the field of physical security, security lighting is often used as a preventative and corrective measure against intrusions or other criminal activity on a physical piece of property. Security lighting may be provided to aid in the detection… … Wikipedia
Windows Security Log — The Security Log, in Microsoft Windows, is a log that contains records of login/logout activity and/or other security related events specified by the system s audit policy. Auditing allows administrators to configure Windows to record operating… … Wikipedia