Turkish | English |
Active Directory Güvenlik Grubu Saptama yöntemi | Active Directory Security Group Discovery method (A Configuration Manager discovery method that searches for security group resources by polling Active Directory Domain Services) |
artırılmış güvenlik | enhanced security (The security type that is used to describe the encrypted protocol used by Application Virtualization to provide secure communications on the various virtual application streaming deliveries leveraging Real Time Streaming Protocol Secure (RTSPS)) |
ağ güvenlik anahtarı | network security key (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key) |
Basit Kimlik Doğrulama ve Güvenlik Katmanı | Simple Authentication and Security Layer (An open framework, described in Request for Comments (RFC) 2222, for adding authentication support to connection-based protocols) |
bildirim temelli güvenlik denetimi | declarative security check (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on) |
Cihaz Güvenlik Yöneticisi | Device Security Manager (A feature in Visual Studio that allows you to configure device security and manage certificates on Windows Mobile-based devices) |
Gelişmiş Güvenlik Özellikli Windows Güvenlik Duvarı | Windows Firewall with Advanced Security (A snap-in which allows users to configure policies that provide enhanced network security for Windows computers) |
Genel Güvenlik Hizmetleri Uygulama Programı Arabirimi | Generic Security Services Application Programming Interface (A generic API for performing client-server authentication that can be implemented over any authentication system. GSS-API makes it possible for applications to use the same API with different authentication mechanisms) |
güvenlik ana bilgisayarı | security host (An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server) |
Güvenlik API'si | Security API (An API for asset protection, usage control, privacy, and policy application) |
güvenlik asıl adı | security principal name (A name that uniquely identifies a user, group, or computer within a single domain. This name is not guaranteed to be unique across domains) |
güvenlik açısından kritik | security-critical (Pertaining to a type or member that accesses secure resources and can only be used by fully trusted code in the .NET Framework) |
güvenlik açısından kritik ve güvenli | security-safe-critical (Pertaining to a type or member that accesses secure resources and can be safely used by partially trusted code in the .NET Framework) |
güvenlik açısından saydam | security-transparent (Pertaining to a type or member that is partially trusted and that cannot expose access to any protected resources or functionality) |
güvenlik açığı | vulnerability (Any weakness, administrative process or act, or physical exposure that makes a computer susceptible to exploit by a threat) |
güvenlik açığı | security vulnerability (A vulnerability in a product that is addressed by a Microsoft security update and security bulletin or a service pack) |
güvenlik bağlamı | security context (The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object) |
güvenlik belirteci | security token (A cryptographically signed data unit that transfers authentication and authorization information, based on a credential) |
güvenlik belirteci hizmeti | security token service (A Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature) In Active Directory Federation Services (ADFS), the Federation Service is a security token service) |
güvenlik biti | secure bit (The bit in a key message used to notify the supplicant and authenticator when a key exchange is complete and a link is considered secure. The bit is set to 0 (not secure) or 1 (secure)) |
güvenlik boşluğu | security hole (An unintentionally unprotected entry point into an otherwise secure computer, component, application, or other online resource) |
güvenlik denetimi | security audit (The process that tracks the activities of users and records selected types of events in the security log) |
güvenlik destek bileşeni | security support component (A hardware-based security facility that implements cryptosystems, random number generation, and key storage) |
güvenlik desteği sağlayıcısı | security support provider (A dynamic-link library (DLL) that implements the Security Support Provider Interface (SSPI) by making one or more security packages available to applications. Each security package provides mappings between an application' SSPI function calls and an actual security model' functions. Security packages support security protocols such as Kerberos and NTLM) |
Güvenlik Desteği Sağlayıcısı Arabirimi | Security Support Provider Interface (A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details) |
güvenlik duvarı | firewall (A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules) |
güvenlik duvarı geçişi | firewall traversal (A technology that provides secure pathways through a firewall and enables multiple data streams to pass thru the firewall on the same port (e.g., audio and video data on the same port)) |
güvenlik filtresi uygulama | security filtering (A method of applying the settings of a Group Policy object (GPO) based on security principals) |
güvenlik grubu | security group (A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group) |
güvenlik günlüğü | security log (An event log containing information on security events that are specified in the audit policy) |
güvenlik ihlali | security breach (An event that compromises the security of a computer, application, network or other resource) |
güvenlik ilişkilendirmesi | security association (A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver) |
güvenlik ilişkisi | security association (A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver) |
güvenlik ilkesi | security policy (The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run) |
güvenlik kapsamı | security scope (A method that, when used in conjunction with security roles, limits which objects an administrative user can use and see) |
güvenlik kimliği | security ID (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created) |
güvenlik kırpması | security trimming (The process of limiting search results based on the identity of the user who submitted the query) |
güvenlik modeli | security model (A structure that organizes application access control permissions by using privilege, duty, and business process classifiers and that grants permissions that are aggregated into duties to user role assignments) |
güvenlik paketi | security package (The software implementation of a security protocol. Security packages are contained in security support provider dynamic-link libraries (DLLs) or in security support provider/authentication package DLLs) |
güvenlik paketi | security pack (A kind of management pack that contains the logic to monitor the security events for a specified application) |
güvenlik protokolü | security protocol (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system) |
güvenlik rolü | security role (A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system) |
güvenlik sertifikası | security certificate (A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service) |
güvenlik sorumlusu | security principal (In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources) |
güvenlik sınırı niteliğinde ağ geçidi | security-edge gateway (A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules) |
güvenlik tanımlayıcısı | security identifier (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created) |
güvenlik tanımlayıcısı | security descriptor (A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited) |
güvenlik tarayıcısı | safety scanner (The free online on-demand tool that conducts three types of scans: the protection scan checks for and removes things like viruses and malware; the clean-up scan checks the hard disk for unnecessary files and helps users decide which ones they can safely remove, and also clears the computer's registry of orphaned data; the tune-up scan helps improve the computer's performance by defragmenting the hard disk) |
güvenlik testi | security test (A test that looks for attack paths that might be used to gain access to assets) |
güvenlik uzantısı | security extension (A component in Reporting Services that authenticates a user or group to a report server) |
Güvenlik Yapılandırma Sihirbazı | Security Configuration Wizard (A tool that automates security best practices to reduce the attack surface for a server. The SCW was introduced with Windows Server 2003 Service Pack 1) |
güvenlik yaygısı | security blanket (A group of values that describe the security settings that apply to all proxies in a process or to just a particular interface proxy) |
güvenlik yöneticisi | security administrator (An administrative user who has been granted the permissions to add, remove, and modify administrative users and their administrative assignments) |
Güvenlik Yöneticisi | Security Administrator (A security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments) |
İnternet Bağlantısı Güvenlik Duvarı | Internet Connection Firewall (A Network Connections feature that is used to set restrictions on what traffic is allowed to enter your network from the Internet) |
kesinlik temelli güvenlik denetimi | imperative security check (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method) |
MasterCard güvenlik kodu | MasterCard SecureCode (A code that credit card companies use to authorize credit card charges. For example, American Express uses a four-digit number on the front of the credit card, and Visa, MasterCard, and Discover use a three-digit number on the back) |
Microsoft Güvenlik Merkezi | Microsoft Safety and Security Center (The Microsoft website of information on and resources for computer security, digital privacy, and online safety) |
Microsoft Güvenlik Merkezi | Microsoft Safety & Security Center (The Microsoft website of information on and resources for computer security, digital privacy, and online safety) |
mutlak güvenlik tanımlayıcısı | absolute security descriptor (A security descriptor structure that contains pointers to the security information associated with an object) |
oturum açma güvenlik modu | login security mode (A security mode that determines the manner in which an instance of SQL Server validates a login request) |
posta etkin evrensel güvenlik grubu | mail-enabled universal security group (A group of recipients that are created to expedite the mass e-mailing of messages and other information. Unlike a mail-enabled universal distribution group, a mail-enabled USG can also be used to assign permissions. When e-mail is sent to a mail-enabled USG, all members of that group receive a copy of the message) |
rol tabanlı güvenlik | role-based security (A method of limiting access to the Service Manager console) |
sosyal güvenlik numarası | social security number (In the United States, a Taxpayer Identification Number assigned to citizens and some noncitizens. The number is required for anyone to obtain work or to receive governmental benefits, such as social security payments after retirement) |
Temel Güvenlik Duvarı | Basic Firewall (A component of the Routing and Remote Access service that combines dynamic packet filtering of network traffic with a set of static packet filters) |
Windows Güvenlik Duvarı | Windows Firewall (A Control Panel feature that is used to set restrictions on what traffic is allowed to enter your network from the Internet) |
Windows Güvenlik Duvarı tam koruma modu | Windows Firewall shielded mode (A features of Windows Firewall that blocks everything) |
Windows Güvenlik Duvarı Yapılandırma Sağlayıcısı | Windows Firewall Configuration Provider (A provider that lets administrators manage Windows Intune policy settings for Windows Firewall to control incoming and outgoing traffic on client computers that are managed by Windows Intune) |
Windows Live OneCare Güvenlik Tarayıcısı | Windows Live OneCare safety scanner (The free online on-demand tool that conducts three types of scans: the protection scan checks for and removes things like viruses and malware; the clean-up scan checks the hard disk for unnecessary files and helps users decide which ones they can safely remove, and also clears the computer's registry of orphaned data; the tune-up scan helps improve the computer's performance by defragmenting the hard disk) |
WS-Güvenlik | WS-Security (A series of specifications that describe how to attach signature and encryption headers to Simple Object Access Protocol (SOAP) messages. In addition, WS-Security describes how to attach security tokens, including binary security tokens such as X.509 certificates and Kerberos tickets, to messages. In Active Directory Federation Services (ADFS), WS-Security is used when Kerberos signs security tokens) |
Yerel Güvenlik Yetkilisi Alt Sistem Hizmeti | Local Security Authority Subsystem Service (An interface for managing local security, domain authentication, and Active Directory processes. It handles authentication for the client and for the server. It also contains features that are used to support Active Directory utilities) |
çevrimiçi güvenlik | online safety (The protection of Internet users from phishing fraud, indentity threat, spyware, and malware (malicious software)) |
ürün güvenlik açıkları | product vulnerability (A set of conditions that violates an implied or explicit security policy. A product vulnerability is normally addressed by a Microsoft security bulletin or a service pack) |
IEEE 802.1X güvenlik standardı | IEEE 802.1X security standard (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks) |