DictionaryForumContacts

Terms containing Security | all forms | exact matches only
SubjectEnglishKorean
comp., MSabsolute security descriptor절대 보안 설명자 (A security descriptor structure that contains pointers to the security information associated with an object)
comp., MSActive Directory Security Group Discovery methodActive Directory 보안 그룹 검색 방법 (A Configuration Manager discovery method that searches for security group resources by polling Active Directory Domain Services)
ITapplication security애플리케이션 보안
ITBusiness Model for Information Security정보 보안 비즈니스 모델BMIS
comp., MScallback security콜백 보안 (A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated)
ITChief Information Security Officer최고 정보보호 책임자
ITChief Security Officer최고 보안책임자
comp., MScode access security코드 액세스 보안 (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)
ITcorporate security officer기업 보안 책임자CSO
ITdata security데이터 보안
comp., MSdeclarative security check선언적 보안 검사 (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on)
comp., MSDevice Security Manager장치 보안 관리자 (A feature in Visual Studio that allows you to configure device security and manage certificates on Windows Mobile-based devices)
ITencapsulation security payload캡슐화 보안 페이로드ESP
comp., MSenhanced security보안 강화 (The security type that is used to describe the encrypted protocol used by Application Virtualization to provide secure communications on the various virtual application streaming deliveries leveraging Real Time Streaming Protocol Secure (RTSPS))
comp., MSenhanced security강화된 보안 (A security type that helps prevent unauthorized persons from discerning that a user is going to the Windows Live sign-in page. Otherwise, an unauthorized person might be able to intercept and manipulate the code on the sign-in page, which could result in user information being transmitted to an unauthorized website)
comp., MSGroup Policy Security Settings그룹 정책 보안 설정 (The subtrees of the Group Policy Object Editor that allow a security administrator to manually configure security levels assigned to a Group Policy object (GPO) or local computer policy)
comp., MSIEEE 802.1X security standardIEEE 802.1X 보안 표준 (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks)
comp., MSimperative security check명령적 보안 검사 (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method)
ITinformation security정보보호
ITinformation security governance정보보호 거버넌스
ITinformation security program정보보호 프로그램
comp., MSInternet Protocol security인터넷 프로토콜 보안 (A set of industry-standard, cryptography-based services and protocols that help to protect data over a network)
ITIP Security IPSecIP 보안IPSec
comp., MSlocal security authority로컬 보안 기관 (A protected subsystem that authenticates and logs users on to the local computer. In addition, the LSA maintains information about all aspects of local security on a computer (collectively known as the local security policy), and it provides various services for translation between names and identifiers)
comp., MSlogin security mode로그인 보안 모드 (A security mode that determines the manner in which an instance of SQL Server validates a login request)
comp., MSmail-enabled universal security group메일 사용이 가능한 유니버설 보안 그룹 (A group of recipients that are created to expedite the mass e-mailing of messages and other information. Unlike a mail-enabled universal distribution group, a mail-enabled USG can also be used to assign permissions. When e-mail is sent to a mail-enabled USG, all members of that group receive a copy of the message)
comp., MSMessage Layer Security메시지 계층 보안 (A cryptographic protocol that provides domain-to-domain secure transmission of SMTP messages on the Internet by using cryptography. The protocol enables SMTP servers to communicate directly or by using an SMTP relay over the Internet in a manner designed to prevent eavesdropping, tampering, and message forgery)
comp., MSMicrosoft Safety and Security CenterMicrosoft 안전 및 보안 센터 (The Microsoft website of information on and resources for computer security, digital privacy, and online safety)
comp., MSMicrosoft Safety & Security CenterMicrosoft 안전 및 보안 센터 (The Microsoft website of information on and resources for computer security, digital privacy, and online safety)
comp., MSnetwork security key네트워크 보안 키 (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
comp., MSnetwork security scan네트워크 보안 검사 (An examination of servers for viruses, spyware, and malware)
ITOpen Source Security Testing Methodology공개소스 보안 테스트 방법론 (OSSTM)
ITOpen Web Application Security Project공개 웹 응용 보안 프로젝트OWASP
comp., MSrole-based security역할 기반 보안 (A method of limiting access to the Service Manager console)
comp., MSsecurity administrator보안 관리자 (A security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments)
comp., MSSecurity Administrator보안 관리자 (A security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments)
comp., MSsecurity advisory보안 공지 (A notification addressing a security change that may affect the security of customers' computers)
comp., MSSecurity API보안 API (An API for asset protection, usage control, privacy, and policy application)
ITSecurity as a Service SecaaS서비스로서의 보안SecaaS
comp., MSsecurity association보안 연결 (A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver)
comp., MSsecurity audit보안 감사 (The process that tracks the activities of users and records selected types of events in the security log)
ITsecurity awareness보안 인식제고
ITsecurity awareness campaign보안 인식제고 캠페인
ITsecurity awareness coordinator보안 인식 제고 조정가
ITsecurity awareness program보안 인식제고 프로그램
comp., MSsecurity blanket보안 블랭킷 (A group of values that describe the security settings that apply to all proxies in a process or to just a particular interface proxy)
comp., MSsecurity certificate보안 인증서 (A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service)
comp., MSSecurity Configuration Wizard보안 구성 마법사 (A tool that automates security best practices to reduce the attack surface for a server. The SCW was introduced with Windows Server 2003 Service Pack 1)
comp., MSsecurity context보안 컨텍스트 (The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object)
comp., MSsecurity-critical보안에 중요한 형식 또는 멤버 (Pertaining to a type or member that accesses secure resources and can only be used by fully trusted code in the .NET Framework)
comp., MSsecurity descriptor보안 설명자 (A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited)
comp., MSsecurity-edge gateway보안 경계security-edge 게이트웨이 (A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules)
comp., MSsecurity-enabled workgroup보안 기능이 설정된 작업 그룹 (An Access workgroup in which users log on with a user name and password and in which access to database objects is restricted according to permissions granted to specific user accounts and groups)
comp., MSsecurity extension보안 확장 프로그램 (A component in Reporting Services that authenticates a user or group to a report server)
comp., MSsecurity file보안 파일 (A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk)
comp., MSsecurity filtering보안 필터링 (A method of applying the settings of a Group Policy object (GPO) based on security principals)
ITsecurity forum보안 포럼
comp., MSsecurity group보안 그룹 (A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group)
comp., MSsecurity hole보안 허점 (An unintentionally unprotected entry point into an otherwise secure computer, component, application, or other online resource)
comp., MSsecurity host보안 호스트 (An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server)
comp., MSsecurity ID보안 ID (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created)
comp., MSsecurity identifier보안 식별자 (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created)
ITsecurity incident보안 사고
comp., MSsecurity label보안 레이블 (A secure e-mail feature that lets you add sensitivity labels, such as Internal Use Only, to the message header. Security labels in your organization are controlled by security policies set up by your e-mail administrator)
ITsecurity management보안 관리
ITsecurity metrics보안 척도
comp., MSsecurity model보안 모델 (A model that defines how access to data is controlled)
comp., MSsecurity pack보안 팩 (A kind of management pack that contains the logic to monitor the security events for a specified application)
comp., MSsecurity package보안 패키지 (The software implementation of a security protocol. Security packages are contained in security support provider dynamic-link libraries (DLLs) or in security support provider/authentication package DLLs)
ITsecurity perimeter보안 경계
ITsecurity policy보안 방침
comp., MSsecurity policy보안 정책 (The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run)
comp., MSsecurity principal보안 주체 (In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources)
comp., MSsecurity principal name보안 주체 이름 (A name that uniquely identifies a user, group, or computer within a single domain. This name is not guaranteed to be unique across domains)
ITsecurity procedures보안 절차
comp., MSsecurity protocol보안 프로토콜 (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system)
comp., MSsecurity role보안 역할 (A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system)
comp., MSsecurity-safe-critical보안 안전에 중요한 (Pertaining to a type or member that accesses secure resources and can be safely used by partially trusted code in the .NET Framework)
comp., MSSecurity Server보안 서버 (Centro server that hosts primary security roles and workloads)
ITsecurity software보안 소프트웨어
ITsecurity standards보안 표준
comp., MSsecurity support component보안 지원 구성 요소 (A hardware-based security facility that implements cryptosystems, random number generation, and key storage)
comp., MSsecurity test보안 테스트 (A test that looks for attack paths that might be used to gain access to assets)
ITsecurity testing보안 테스트
comp., MSsecurity token보안 토큰 (A cryptographically signed data unit that transfers authentication and authorization information, based on a credential)
comp., MSsecurity token service보안 토큰 서비스 (A Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature) In Active Directory Federation Services (ADFS), the Federation Service is a security token service)
ITsecurity/transaction risk보안/트랜잭션 위험
comp., MSsecurity-transparent보안 투명 (Pertaining to a type or member that is partially trusted and that cannot expose access to any protected resources or functionality)
comp., MSsecurity trimming보안 조정 (The process of limiting search results based on the identity of the user who submitted the query)
comp., MSSIM securitySIM 보안 (A toggle switch that you tap to enter a SIM PIN)
ITtechnical infrastructure security기술적 인프라 보안
ITTransport Layer Security전송 계층 보안 (TLS)
comp., MSTransport Layer Security전송 계층 보안 (A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol)
comp., MSTransport Layer Security encryptionTLS전송 계층 보안 암호화 (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
comp., MSuser-level security사용자 수준 보안 (When using user-level security in an Access database, a database administrator or an object's owner can grant individual users or groups of users specific permissions to tables, queries, forms, reports, and macros)
comp., MSWindows Firewall with Advanced Security고급 보안이 포함된 Windows 방화벽 (A snap-in which allows users to configure policies that provide enhanced network security for Windows computers)
comp., MSWindows NT Integrated SecurityWindows NT 통합 보안 (A security mode that leverages the Windows NT authentication process)
comp., MSWindows Security Health AgentWindows 보안 상태 에이전트 (Windows system health agent (SHA) for Network Access Protection (NAP). Windows Security Health Agent provides status of system health components that are monitored by Windows Security Center, such as the status of Windows Firewall, antivirus applications, and Windows Update)
comp., MSWindows Security Health ValidatorWindows 보안 상태 검사기 (Windows system health validator (SHV) for Network Access Protection (NAP). Windows Security Health Validator verifies status of system health components that are received in a statement of health (SoH) from NAP client computers that have the Windows Security Health Agent installed)

Get short URL