DictionaryForumContacts

   English
Terms containing Information Security Management | all forms | exact matches only | in specified order only
SubjectEnglishRussian
lawFederal Information Security Management ActФедеральный закон об управлении информационной безопасностью (Technical)
comp.information security incident managementменеджмент инцидента информационной безопасности (ГОСТ Р ИСО МЭК 27000-2012 ssn)
data.prot.information security managementуправление информационной безопасностью (igisheva)
progr.information security managementменеджмент защиты информации (ssn)
lawinformation security management systemсистема менеджмента информационной безопасностью (wiki – ISMS Alexander Demidov)
comp.Information security management systemСМИБ (LyuFi)
data.prot.information security management systemсистема менеджмента информационной безопасности (r313)
data.prot.Information security management systemСистема менеджмента информационной безопасности (r313)
comp.information security management systemсистема управления информационной безопасностью (ssn)
data.prot.information security risk managementуправление информационными рисками (igisheva)
data.prot.information security risk managementуправление рисками нарушения информационной безопасности (igisheva)
data.prot.security information and event managementуправление информацией о безопасности и событиями безопасности (a set of tools and practices aimed at collecting, aggregating, analyzing, and correlating security-related data from various sources in an organization's IT environment in order to provide real-time monitoring, detection, and alerting of security events or incidents, helping security teams to identify and respond to potential threats effectively Alex_Odeychuk)
sec.sys., USAsecurity information and event management systemинформационно-аналитическая система безопасности (collects and aggregates log data generated throughout the organization's technology infrastructure, from host systems and applications to network and security devices such as firewalls and antivirus filters. The software then identifies and categorizes incidents and events, as well as analyzes them. The software delivers on two main objectives, which are to provide reports on security-related incidents and events, such as successful and failed logins, malware activity and other possible malicious activities, and to send alerts if analysis shows that an activity runs against predetermined rulesets and thus indicates a potential security issue Alex_Odeychuk)
data.prot.security information managementуправление информацией о безопасности (collecting and storing log data generated by various devices, applications, and systems within the organization. This data includes event logs, system logs, network logs, and other security-related information Alex_Odeychuk)
sec.sys.security management information baseбаза информации управления безопасностью