Examples of using Security techniques in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
JTC 1/SC 27, IT Security techniques.
Joint Technical Committee ISO/IEC JTC 1- Information Technology and Subcommittee SC 27- IT security techniques.
ISO/IEC JTC 1/SC 27, Security techniques.
This short, free online course will helpprofessionals understand the first steps of network security techniques.
Information technology- Security techniques- Incident investigation principles and processes.
Try not to be modest about conversing with the specialists about security techniques. via.
It's a bit worrying to see security techniques from the 1990s used in new vehicles.
The so-called“Krack” attack hasbeen described as a“fundamental flaw” in wireless security techniques by experts.
Conducted research on success of security techniques in order to focus on the most successful strategies employed in the industry.
It is vain to think, however, that librarians and archivists are anything but bystanders observing the rapid development of network protocols, bandwidth,or data security techniques.
Furthermore, the payoff from this attack is low since other security techniques are often employed such as shadow accounts.
Information technology-- Security techniques-- Information security management guidelines for telecommunications organizations based on ISO/IEC 27002.
The Company shall apply encryption using the Secure Socket Layer(SSL)protocol or similar security techniques to prepare for illegal access by third parties to ensure safety.
Information technology- Security techniques- Code of practice for protection of personally identifiable information(PII) in public clouds acting as PII processors.
A new ISO standard, ISO/IEC 27032:2012,Information technology- Security techniques- Guidelines for cybersecurity, will make cyberspace safer.
They also use different security techniques like blocking the IP address and use different security tools and strategies to prevent the players for playing same tables from the same location.
This program offers a unique opportunity to learn about specialist security techniques and use real-world networking equipment in a security context.
With this course, you will learn about different types of web attacks by targeting a test environment based on OWASP Web Goat,a deliberately vulnerable web app used to practice security techniques.
Take action with a combination of multiple security techniques combined with the latest threat information, powered by XGen™ security. .
This Seal has been developed through a base of synthetic paper with special characteristics such as an auto-destructive feature before any attempts of removal andwith several maximum security techniques added.
The recently updated ISO/IEC 27004:2016, Information technology- Security techniques- Information security management- Monitoring, measurement, analysis and evaluation, provides guidance on how to assess the performance of ISO/IEC 27001.
It functions without the need for an agent or any particular access privileges and allows Active Directory users to ensure the resistance of theirinfrastructure against cyber-risks without the need for any specific knowledge of security techniques.
One of the standards in that series, ISO/IEC 27007,Information technology- Security techniques- Guidelines for information security management systems auditing, provides guidelines for effective audits of ISMS to ensure they are as robust and competent as they are intended to be.
ISO/IEC 27701, Security techniques- Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management- Requirements and guidelines, specifies the requirements for establishing, implementing, maintaining and continually improving a privacy-specific information security management system.
Formerly referred to as ISO/IEC 27552 during its development, it builds on ISO/IEC 27001,Information Technology- Security techniques- Information security management systems- Requirements, providing the necessary extra requirements when it comes to privacy.
ISO/IEC 27040:2015 Information technology- Security techniques- Storage security provides detailed technical guidance on how to effectively manage all aspects of data storage security, from the planning and design to the implementation and documentation.