security management

security management
управление безопасностью
одна из пяти категорий средств сетевого управления (network management) согласно модели ISO. Процесс управления доступом к сети и её ресурсам (предоставление, ограничение, допущение, запрещение). Может предусматривать составление и ведение списков доступа в маршрутизаторах (создание брандмауэров), организацию парольной защиты для критических сетевых ресурсов, выявление и блокировку точек возможного проникновения злоумышленников

Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.

Игры ⚽ Поможем написать реферат

Смотреть что такое "security management" в других словарях:

  • Security management — is a broad field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization s information assets and the development, documentation and implementation of… …   Wikipedia

  • Security Management (magazine) — Security Management magazine is the monthly publication of ASIS International (formerly the American Society for Industrial Security). The publication combines feature articles on topics such as terrorism and corporate espionage with staff… …   Wikipedia

  • ITIL Security Management — The ITIL Security Management process describes the structured fitting of security in the management organization. ITIL Security Management is based on the Code of practice for information security management also known as ISO/IEC 17799.A basic… …   Wikipedia

  • D3 Security Management Systems — D3 Security Management Systems, Inc. Type Private Industry Software; Software as a service; Security management; Governance, risk management, and compliance Genre Software development Founded 2002 Founder(s …   Wikipedia

  • Information security management system — An Information Security Management System (ISMS) is, as the name suggests, a set of policies concerned with information security management. The idiom arises primarily out of ISO/IEC 27001.The key concept of ISMS is for an organization to design …   Wikipedia

  • NHS Counter Fraud and Security Management Service Division — The Counter Fraud and Security Management Division protects the staff, assets and resources of the National Health Service in England and Wales. Since 1 April 2006 it has been a division of the NHS Business Services Authority, a special health… …   Wikipedia

  • Aetos Security Management — The Aetos Security Management Private Limited, is one of the five commercial Auxiliary Police forces authorised to provide armed security officers in Singapore to government organisations as well as private companies. A fully owned subsidiary of… …   Wikipedia

  • NHS Counter Fraud and Security Management Service — The NHS Counter Fraud and Security Management Service (NHS CFSMS) is the organisation with the remit to protect the staff, assets and resources of the NHS in England and Wales. Since the 1st of April 2006 it has been a division of the NHS… …   Wikipedia

  • Federal Information Security Management Act of 2002 — The Federal Information Security Management Act of 2002 ( FISMA , usc|44|3541, et seq. ) is a United States federal law enacted in 2002 as Title III of the E Government Act of 2002 (USPL|107|347, USStat|116|2899). The act was meant to bolster… …   Wikipedia

  • Information Systems Security Management Professional — is a designation awarded by the International Information Systems Certification Consortium ((ISC)^2).For experienced information security professionals with an International Information Systems Security Certification Consortium ((ISC)2)… …   Wikipedia

  • Information Security Management — Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Information security management (ISM) are controls that… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»