- Critical Information Requirements
- Military: CIR
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Critical Infrastructure Protection — or CIP is a national program to assure the security of vulnerable and interconnected infrastructures of the United States. In May 1998, President Bill Clinton issued Presidential directive PDD 63 [ [http://www.fas.org/irp/offdocs/pdd/pdd 63.htm… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Critical infrastructure protection — Public infrastructure Assets and facilities Airports · Bridges · Broadband& … Wikipedia
information system — Introduction an integrated set of components for collecting, storing, processing, and communicating information (information science). Business firms, other organizations, and individuals in contemporary society rely on information systems… … Universalium
Information Technology Association of America — The Information Technology Association of America (ITAA) is a leading industry trade group for information technology companies. The Association s membership contains most all of the world s major ICT firms and accounts for over 90% of ICT goods… … Wikipedia
Critical thinking — is the process or method of thinking that questions assumptions. It is a way of deciding whether a claim is true, false, or sometimes true and sometimes false, or partly true and partly false. The origins of critical thinking can be traced in… … Wikipedia
Requirements analysis — in systems engineering and software engineering, encompasses those tasks that go into determining the needs or conditions to meet for a new or altered product, taking account of the possibly conflicting requirements of the various stakeholders,… … Wikipedia
Information technology law — (or IT Law) is a set of recent legal enactments, currently in existence in several countries, which governs the process and dissemination of information digitally. These legal enactments cover a broad gambit of different aspects relating to… … Wikipedia
Information manipulation theory — (IMT)( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992;( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , [http://comm.msu.edu/people/faculty/149 Levine] , Torres, Campbell,… … Wikipedia
Information security professionalism — is the set of knowledge that people working in Information security and similar fields (Information Assurance and Computer security) should have and eventually demonstrate through certifications from well respected organizations. It also… … Wikipedia
Critical Nuclear Weapon Design Information — (CNWDI) is a U.S. Department of Defense category of Top Secret Restricted Data or Secret Restricted Data that reveals the theory of operation or design of the components of a thermonuclear or fission bomb, warhead, demolition munition, or test… … Wikipedia