DictionaryForumContacts

Terms containing Security | all forms | exact matches only
SubjectEnglishHebrew
comp., MSabsolute security descriptorמתאר אבטחה מוחלט (A security descriptor structure that contains pointers to the security information associated with an object)
comp., MScallback securityאבטחת התקשרות חזרה (A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated)
comp., MScode access securityאבטחת גישת קוד (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)
comp., MSdeclarative security checkבדיקת אבטחה הצהרתית (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on)
comp., MSenhanced securityאבטחה משופרת (A security type that helps prevent unauthorized persons from discerning that a user is going to the Windows Live sign-in page. Otherwise, an unauthorized person might be able to intercept and manipulate the code on the sign-in page, which could result in user information being transmitted to an unauthorized website)
comp., MSIEEE 802.1X security standardתקן אבטחה IEEE 802.1x (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks)
comp., MSimperative security checkבדיקת אבטחה מחויבת (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method)
comp., MSInternet Protocol securityאבטחת פרוטוקול אינטרנט (A set of industry-standard, cryptography-based services and protocols that help to protect data over a network)
comp., MSmail-enabled universal security groupקבוצת אבטחה אוניברסלית מותאמת דואר (A group of recipients that are created to expedite the mass e-mailing of messages and other information. Unlike a mail-enabled universal distribution group, a mail-enabled USG can also be used to assign permissions. When e-mail is sent to a mail-enabled USG, all members of that group receive a copy of the message)
comp., MSMicrosoft Safety and Security Centerמרכז הבטיחות והאבטחה של Microsoft (The Microsoft website of information on and resources for computer security, digital privacy, and online safety)
comp., MSMicrosoft Safety & Security Centerמרכז הבטיחות והאבטחה של Microsoft (The Microsoft website of information on and resources for computer security, digital privacy, and online safety)
comp., MSnetwork security keyמפתח אבטחת רשת (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
comp., MSsecurity administratorמנהל אבטחה (An administrative user who has been granted the permissions to add, remove, and modify administrative users and their administrative assignments)
comp., MSSecurity APIAPI של אבטחה (An API for asset protection, usage control, privacy, and policy application)
comp., MSsecurity associationשיוך אבטחה (A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver)
comp., MSSecurity Configuration Wizardאשף קביעת תצורת אבטחה (A tool that automates security best practices to reduce the attack surface for a server. The SCW was introduced with Windows Server 2003 Service Pack 1)
comp., MSsecurity contextהקשר אבטחה (The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object)
comp., MSsecurity descriptorמתאר אבטחה (A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited)
comp., MSsecurity disablerמנטרל אבטחה (A type of Trojan that disables security settings or products such as antivirus software)
comp., MSsecurity-edge gatewayאבטחת שער קצה (A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules)
comp., MSsecurity fileקובץ אבטחה (A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk)
comp., MSsecurity filteringסינון על-פי אבטחה (A method of applying the settings of a Group Policy object (GPO) based on security principals)
comp., MSsecurity groupקבוצת אבטחה (A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group)
comp., MSsecurity holeפירצה באבטחה (An unintentionally unprotected entry point into an otherwise secure computer, component, application, or other online resource)
comp., MSsecurity hostמארח אבטחה (An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server)
comp., MSsecurity IDמזהה אבטחה (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created)
comp., MSsecurity identifierמזהה אבטחה (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created)
comp., MSsecurity logיומן אבטחה (An event log containing information on security events that are specified in the audit policy)
comp., MSsecurity modelמודל אבטחה (A structure that organizes application access control permissions by using privilege, duty, and business process classifiers and that grants permissions that are aggregated into duties to user role assignments)
comp., MSsecurity policyמדיניות אבטחה (The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run)
comp., MSsecurity principalמנהל אבטחה (In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources)
comp., MSsecurity principal nameשם מנהל אבטחה (A name that uniquely identifies a user, group, or computer within a single domain. This name is not guaranteed to be unique across domains)
comp., MSsecurity roleתפקיד אבטחה (A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system)
comp., MSsecurity support componentרכיב תמיכת אבטחה (A hardware-based security facility that implements cryptosystems, random number generation, and key storage)
comp., MSSecurity Support Provider Interfaceממשק ספק תמיכה באבטחה (A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details)
comp., MSsecurity testבדיקת אבטחה (A test that looks for attack paths that might be used to gain access to assets)
comp., MSsecurity token serviceשירות אסימוני אבטחה (A Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature) In Active Directory Federation Services (ADFS), the Federation Service is a security token service)
comp., MSsecurity update packageחבילת עדכון אבטחה (" A broadly released fix for a product-specific security-related vulnerability. Security vulnerabilities are rated based on their severity which is indicated in the Microsoft's security bulletin as "critical," "important," "moderate, or "low.")
comp., MSSIM securityאבטחת SIM (A toggle switch that you tap to enter a SIM PIN)
comp., MSsocial security numberמספר ביטוח לאומי (In the United States, a Taxpayer Identification Number assigned to citizens and some noncitizens. The number is required for anyone to obtain work or to receive governmental benefits, such as social security payments after retirement)
comp., MSTransport Layer Security encryptionהצפנת Transport Layer Security (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
comp., MSuser-level securityאבטחה ברמת המשתמש (When using user-level security in an Access database, a database administrator or an object's owner can grant individual users or groups of users specific permissions to tables, queries, forms, reports, and macros)
comp., MSWindows Firewall with Advanced Securityחומת אש של Windows עם אבטחה מתקדמת (A snap-in which allows users to configure policies that provide enhanced network security for Windows computers)
comp., MSWindows Security Health Agentסוכן תקינות האבטחה של Windows (Windows system health agent (SHA) for Network Access Protection (NAP). Windows Security Health Agent provides status of system health components that are monitored by Windows Security Center, such as the status of Windows Firewall, antivirus applications, and Windows Update)
comp., MSWindows Security Health Validatorמאמת תקינות האבטחה של Windows (Windows system health validator (SHV) for Network Access Protection (NAP). Windows Security Health Validator verifies status of system health components that are received in a statement of health (SoH) from NAP client computers that have the Windows Security Health Agent installed)

Get short URL