Subject | English | Chinese Taiwan |
comp., MS | absolute security descriptor | 絕對安全性描述元 (A security descriptor structure that contains pointers to the security information associated with an object) |
comp., MS | Active Directory Security Group Discovery method | Active Directory 安全性群組探索方法 (A Configuration Manager discovery method that searches for security group resources by polling Active Directory Domain Services) |
comp., MS | callback security | 回撥安全性 (A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated) |
comp., MS | code access security | 程式碼存取安全性 (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
comp., MS | declarative security check | 宣告式安全性檢查 (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on) |
comp., MS | Device Security Manager | 裝置安全性管理員 (A feature in Visual Studio that allows you to configure device security and manage certificates on Windows Mobile-based devices) |
comp., MS | enhanced security | 增強的安全性 (A security type that helps prevent unauthorized persons from discerning that a user is going to the Windows Live sign-in page. Otherwise, an unauthorized person might be able to intercept and manipulate the code on the sign-in page, which could result in user information being transmitted to an unauthorized website) |
comp., MS | Generic Security Services Application Programming Interface | 一般安全性服務應用程式開發介面 (A generic API for performing client-server authentication that can be implemented over any authentication system. GSS-API makes it possible for applications to use the same API with different authentication mechanisms) |
comp., MS | hardware security module | 硬體安全模組 (A secure device that provides cryptographic capabilities, typically by providing private keys used in Public-key cryptography) |
comp., MS | IEEE 802.1X security standard | IEEE 802.1X 資訊安全標準 (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks) |
comp., MS | imperative security check | 命令式安全性檢查 (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method) |
comp., MS | Internet Protocol security | 網際網路通訊協定安全性 (A set of industry-standard, cryptography-based services and protocols that help to protect data over a network) |
comp., MS | local security authority | 本機安全性授權 (A protected subsystem that authenticates and logs users on to the local computer. In addition, the LSA maintains information about all aspects of local security on a computer (collectively known as the local security policy), and it provides various services for translation between names and identifiers) |
comp., MS | Local Security Authority Subsystem Service | 本機安全性授權子系統服務 (An interface for managing local security, domain authentication, and Active Directory processes. It handles authentication for the client and for the server. It also contains features that are used to support Active Directory utilities) |
comp., MS | login security mode | 登入安全性模式 (A security mode that determines the manner in which an instance of SQL Server validates a login request) |
comp., MS | mail-enabled universal security group | 郵件萬用資訊安全群組 (A group of recipients that are created to expedite the mass e-mailing of messages and other information. Unlike a mail-enabled universal distribution group, a mail-enabled USG can also be used to assign permissions. When e-mail is sent to a mail-enabled USG, all members of that group receive a copy of the message) |
comp., MS | Message Layer Security | 訊息層資訊安全 (A cryptographic protocol that provides domain-to-domain secure transmission of SMTP messages on the Internet by using cryptography. The protocol enables SMTP servers to communicate directly or by using an SMTP relay over the Internet in a manner designed to prevent eavesdropping, tampering, and message forgery) |
comp., MS | Microsoft Safety and Security Center | Microsoft 資訊安全中心 (The Microsoft website of information on and resources for computer security, digital privacy, and online safety) |
comp., MS | Microsoft Safety & Security Center | Microsoft 資訊安全中心 (The Microsoft website of information on and resources for computer security, digital privacy, and online safety) |
comp., MS | network security key | 網路安全性金鑰 (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key) |
comp., MS | role-based security | 角色型安全性 (A method of limiting access to the Service Manager console) |
comp., MS | Security Administrator | 安全性系統管理員 (A security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments) |
comp., MS | security advisory | 資訊安全諮詢 (A notification addressing a security change that may affect the security of customers' computers) |
comp., MS | security alert | 安全性警訊 (Documentation for developers that describes specific security risks and how to avoid them when implementing Microsoft software) |
comp., MS | Security API | 安全性 API (An API for asset protection, usage control, privacy, and policy application) |
comp., MS | security association | 安全性關聯 (A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver) |
comp., MS | security audit | 安全性稽核 (The process that tracks the activities of users and records selected types of events in the security log) |
comp., MS | security blanket | 保護傘 (A group of values that describe the security settings that apply to all proxies in a process or to just a particular interface proxy) |
comp., MS | security certificate | 安全性憑證 (A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service) |
comp., MS | Security Configuration Wizard | 資訊安全設定精靈 (A tool that automates security best practices to reduce the attack surface for a server. The SCW was introduced with Windows Server 2003 Service Pack 1) |
comp., MS | security context | 資訊安全內容 (The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object) |
comp., MS | security-critical | 安全性關鍵 (Pertaining to a type or member that accesses secure resources and can only be used by fully trusted code in the .NET Framework) |
comp., MS | security descriptor | 安全性描述元 (A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited) |
comp., MS | security disabler | 資訊安全停用木馬程式 (A type of Trojan that disables security settings or products such as antivirus software) |
comp., MS | security-edge gateway | 安全性界限閘道 (A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules) |
comp., MS | security-enabled workgroup | 啟用安全性工作群組 (An Access workgroup in which users log on with a user name and password and in which access to database objects is restricted according to permissions granted to specific user accounts and groups) |
comp., MS | security extension | 安全性延伸模組 (A component in Reporting Services that authenticates a user or group to a report server) |
comp., MS | security file | 安全性檔案 (A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk) |
comp., MS | security filtering | 安全性篩選 (A method of applying the settings of a Group Policy object (GPO) based on security principals) |
comp., MS | security group | 安全性群組 (A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group) |
comp., MS | security hole | 安全性漏洞 (An unintentionally unprotected entry point into an otherwise secure computer, component, application, or other online resource) |
comp., MS | security host | 安全性主機 (An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server) |
comp., MS | security ID | 安全性識別碼 (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created) |
comp., MS | security identifier | 安全性識別碼 (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created) |
comp., MS | security pack | 安全性組件 (A kind of management pack that contains the logic to monitor the security events for a specified application) |
comp., MS | security package | 安全性封裝 (The software implementation of a security protocol. Security packages are contained in security support provider dynamic-link libraries (DLLs) or in security support provider/authentication package DLLs) |
comp., MS | security policy | 安全性原則 (The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run) |
comp., MS | security principal | 安全性主體 (In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources) |
comp., MS | security principal name | 安全性主體名稱 (A name that uniquely identifies a user, group, or computer within a single domain. This name is not guaranteed to be unique across domains) |
comp., MS | security protocol | 安全性通訊協定 (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system) |
comp., MS | security role | 資訊安全角色 (A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system) |
comp., MS | security role | 安全性角色 (A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system) |
comp., MS | security-safe-critical | 安全性安全關鍵 (Pertaining to a type or member that accesses secure resources and can be safely used by partially trusted code in the .NET Framework) |
comp., MS | security support component | 安全性支援元件 (A hardware-based security facility that implements cryptosystems, random number generation, and key storage) |
comp., MS | security support provider | 安全性支援提供者 (A dynamic-link library (DLL) that implements the Security Support Provider Interface (SSPI) by making one or more security packages available to applications. Each security package provides mappings between an application' SSPI function calls and an actual security model' functions. Security packages support security protocols such as Kerberos and NTLM) |
comp., MS | Security Support Provider Interface | 安全性支援提供者介面 (A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details) |
comp., MS | security test | 安全性測試 (A test that looks for attack paths that might be used to gain access to assets) |
comp., MS | security token | 安全性權杖 (A cryptographically signed data unit that transfers authentication and authorization information, based on a credential) |
comp., MS | security-transparent | 安全性透明的 (Pertaining to a type or member that is partially trusted and that cannot expose access to any protected resources or functionality) |
comp., MS | SIM security | SIM 卡安全性 (A toggle switch that you tap to enter a SIM PIN) |
comp., MS | Simple Authentication and Security Layer | 簡單驗證及安全性階層 (An open framework, described in Request for Comments (RFC) 2222, for adding authentication support to connection-based protocols) |
comp., MS | Transport Layer Security | 傳輸層安全性 (A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol) |
comp., MS | user-level security | 使用者層次安全性 (When using user-level security in an Access database, a database administrator or an object's owner can grant individual users or groups of users specific permissions to tables, queries, forms, reports, and macros) |
comp., MS | Web Services Security | Web 服務安全性 (A series of specifications that describe how to attach signature and encryption headers to Simple Object Access Protocol (SOAP) messages. In addition, WS-Security describes how to attach security tokens, including binary security tokens such as X.509 certificates and Kerberos tickets, to messages. In Active Directory Federation Services (ADFS), WS-Security is used when Kerberos signs security tokens) |
comp., MS | Windows Firewall with Advanced Security | 具有進階安全性的 Windows 防火牆 (A snap-in which allows users to configure policies that provide enhanced network security for Windows computers) |
comp., MS | Windows NT Integrated Security | Windows NT 整合式安全性 (A security mode that leverages the Windows NT authentication process) |
comp., MS | WS-Security | Web 服務安全性 (A series of specifications that describe how to attach signature and encryption headers to Simple Object Access Protocol (SOAP) messages. In addition, WS-Security describes how to attach security tokens, including binary security tokens such as X.509 certificates and Kerberos tickets, to messages. In Active Directory Federation Services (ADFS), WS-Security is used when Kerberos signs security tokens) |