- unauthorized detection
- Военный термин: ведение несанкционированной разведки с целью обнаружения радиоэлектронных средств
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop … Wikipedia
Motion detection — is a process of confirming a change in position of an object relative to its surroundings or the change in the surroundings relative to an object. This detection can be achieved by both mechanical and electronic methods. In addition to discrete,… … Wikipedia
Domestic Nuclear Detection Office — Agency overview Formed April 15, 2005 Jurisdiction United States Employees 137 Annual budget US$563,800,000 Agency executive Warren Michael Stern, Director Par … Wikipedia
encrypt — [en kript′] vt. [< EN 1 + CRYPT(OGRAM)] 1. to encode or encipher 2. Comput. to add an electronic digital code to (data) being sent over a public network to prevent its unauthorized detection, use, copying, etc. encryption n … English World dictionary
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Anti-frogman techniques — are security methods developed to protect watercraft, ports and installations, and other sensitive resources both in or nearby vulnerable waterways from potential threats or intrusions by frogmen or other divers.Risks and threats to be defended… … Wikipedia
Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Wireless intrusion prevention system — In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection) , and can automatically take countermeasures (intrusion… … Wikipedia
Nmap — Security Scanner results of an Nmap scan Original author(s) Gordon Lyon (Fyodor) Initial release September, 1997 … Wikipedia
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia