electronic information security incident

electronic information security incident
elektroninės informacijos saugos incidentas statusas Aprobuotas sritis informacija, informacinės technologijos ir informacinė visuomenė apibrėžtis Įvykis ar veiksmas, kurie gali sudaryti galimybę neteisėtai prisijungus prie valstybės registro, žinybinio registro, valstybės informacinės sistemos ar kitos informacinės sistemos taip sutrikdyti ar pakeisti jų veiklą, kad būtų sunaikinta, sugadinta ar pakeista elektroninė informacija, panaikinta ar apribota galimybė ja naudotis, sudarytos sąlygos ją pasisavinti, neteisėtai paskleisti ar kitaip panaudoti. atitikmenys: angl. electronic information security incident šaltinis Lietuvos Respublikos Vyriausybės nutarimo „Dėl Bendrųjų elektroninės informacijos saugos reikalavimų, Saugos dokumentų turinio gairių ir Valstybės informacinių sistemų, registrų ir kitų informacinių sistemų klasifikavimo ir elektroninės informacijos svarbos nustatymo gairių patvirtinimo“ projektas

Lithuanian dictionary (lietuvių žodynas). 2015.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events …   Wikipedia

  • Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… …   Wikipedia

  • Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… …   Wikipedia

  • Information technology audit — An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization s… …   Wikipedia

  • Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro …   Wikipedia

  • Electronic paper — Electronic paper, also called e paper, is a display technology designed to mimic the appearance of ordinary ink on paper. Unlike a conventional flat panel display, which uses a backlight to illuminate its pixels, electronic paper reflects light… …   Wikipedia

  • Information technology controls — In business and accounting, Information technology controls (or IT controls) are specific activities performed by persons or systems designed to ensure that business objectives are met. They are a subset of an enterprise s internal control. IT… …   Wikipedia

  • Information Technology (IT) in Burma —    The seizure of power by the State Law and Order Restoration Council (SLORC) in September 1988 occurred on the eve of the revolution in information technology that made the Internet and electronic mail available around the world. By the mid… …   Historical Dictionary of Burma (Myanmar)

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”