Intruder Detection Systems

Intruder Detection Systems
Abbreviation: IDS

Универсальный русско-английский словарь. . 2011.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "Intruder Detection Systems" в других словарях:

  • Intruder detection — In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This techniques try to identify the person analyzing their computational behaviour.This concept is not yet very extended and tend to… …   Wikipedia

  • Diver Detection Sonar — (DDS) systems are sonar and acoustic location systems employed underwater for the detection of divers and submerged swimmer delivery vehicles (SDVs). The purpose of this type of sonar system is to provide detection, tracking and classification… …   Wikipedia

  • Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop …   Wikipedia

  • Intrusion detection — In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. When Intrusion detection takes a preventive measure without direct human… …   Wikipedia

  • A-6 Intruder — Infobox Aircraft name = A 6 Intruder type = Attack aircraft manufacturer = Grumman caption =The A 6E Intruder designer = first flight = 19 April 1960 introduced = 1963 retired = 1997 primary user = United States Navy more users = United States… …   Wikipedia

  • Host-based intrusion detection system — A host based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the internals of a computing system rather than on its external interfaces (as a network based intrusion detection system (NIDS) would do) …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Burglar alarm — Silent alarm redirects here. For the album, see Silent Alarm (album). Burglar (or intrusion), fire and safety alarms are all electronic today. Sensors are connected to a control unit via a low voltage hardwire or narrowband RF signal which is… …   Wikipedia

  • Honeypot (computing) — In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a… …   Wikipedia

  • Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… …   Wikipedia

  • Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»