electronic information security incident
- electronic information security incident
- elektroninės informacijos saugos incidentas
statusas Aprobuotas
sritis informacija, informacinės technologijos ir informacinė visuomenė
apibrėžtis Įvykis ar veiksmas, kurie gali sudaryti galimybę neteisėtai prisijungus prie valstybės registro, žinybinio registro, valstybės informacinės sistemos ar kitos informacinės sistemos taip sutrikdyti ar pakeisti jų veiklą, kad būtų sunaikinta, sugadinta ar pakeista elektroninė informacija, panaikinta ar apribota galimybė ja naudotis, sudarytos sąlygos ją pasisavinti, neteisėtai paskleisti ar kitaip panaudoti.
atitikmenys: angl. electronic information security incident
šaltinis Lietuvos Respublikos Vyriausybės nutarimo „Dėl Bendrųjų elektroninės informacijos saugos reikalavimų, Saugos dokumentų turinio gairių ir Valstybės informacinių sistemų, registrų ir kitų informacinių sistemų klasifikavimo ir elektroninės informacijos svarbos nustatymo gairių patvirtinimo“ projektas
Lithuanian dictionary (lietuvių žodynas).
2015.
Look at other dictionaries:
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events … Wikipedia
Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… … Wikipedia
Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… … Wikipedia
Information technology audit — An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization s… … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Electronic paper — Electronic paper, also called e paper, is a display technology designed to mimic the appearance of ordinary ink on paper. Unlike a conventional flat panel display, which uses a backlight to illuminate its pixels, electronic paper reflects light… … Wikipedia
Information technology controls — In business and accounting, Information technology controls (or IT controls) are specific activities performed by persons or systems designed to ensure that business objectives are met. They are a subset of an enterprise s internal control. IT… … Wikipedia
Information Technology (IT) in Burma — The seizure of power by the State Law and Order Restoration Council (SLORC) in September 1988 occurred on the eve of the revolution in information technology that made the Internet and electronic mail available around the world. By the mid… … Historical Dictionary of Burma (Myanmar)
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium