DictionaryForumContacts

   English
Terms for subject Microsoft containing securities | all forms
EnglishGerman
callback securityRückrufsicherheit (A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated)
login security modeAnwendungssicherheitsmodus (A security mode that determines the manner in which an instance of SQL Server validates a login request)
network security scanÜberprüfung der Netzwerksicherheit (An examination of servers for viruses, spyware, and malware)
security administratorSicherheitsadministrator (An administrative user who has been granted the permissions to add, remove, and modify administrative users and their administrative assignments)
Security APISicherheits-API (An API for asset protection, usage control, privacy, and policy application)
security associationSicherheitszuordnung (A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver)
security certificateSicherheitszertifikat (A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service)
security contextSicherheitskontext (The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object)
security descriptorSicherheitsbeschreibung (A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited)
security disablerSicherheitsdeaktivierer (A type of Trojan that disables security settings or products such as antivirus software)
security-enabled workgroupArbeitsgruppe mit aktivierter Sicherheit (An Access workgroup in which users log on with a user name and password and in which access to database objects is restricted according to permissions granted to specific user accounts and groups)
security groupSicherheitsgruppe (A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group)
security holeSicherheitslücke (An unintentionally unprotected entry point into an otherwise secure computer, component, application, or other online resource)
security hostSicherheitshost (An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server)
security keySicherheitscode (An identifier used by two APPC logical units (LUs) to validate security when a session is activated. The security key performs a function similar to that of a password, but at the LU-LU session level rather than at the TP-conversation level)
security labelSicherheitskennzeichen (A secure e-mail feature that lets you add sensitivity labels, such as Internal Use Only, to the message header. Security labels in your organization are controlled by security policies set up by your e-mail administrator)
security packageSicherheitspaket (The software implementation of a security protocol. Security packages are contained in security support provider dynamic-link libraries (DLLs) or in security support provider/authentication package DLLs)
security policySicherheitsrichtlinie (The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run)
security principal nameSicherheitsprinzipalname (A name that uniquely identifies a user, group, or computer within a single domain. This name is not guaranteed to be unique across domains)
security protocolSicherheitsprotokoll (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system)
security roleSicherheitsrolle (A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system)
security scopeSicherheitsbereich (A method that, when used in conjunction with security roles, limits which objects an administrative user can use and see)
security support componentSicherheitsunterstützungskomponente (A hardware-based security facility that implements cryptosystems, random number generation, and key storage)
security support providerSecurity Support Provider (A dynamic-link library (DLL) that implements the Security Support Provider Interface (SSPI) by making one or more security packages available to applications. Each security package provides mappings between an application' SSPI function calls and an actual security model' functions. Security packages support security protocols such as Kerberos and NTLM)
security token serviceSicherheitstokendienst (A Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature) In Active Directory Federation Services (ADFS), the Federation Service is a security token service)
security updateSicherheitsupdate (" A broadly released fix for a product-specific security-related vulnerability. Security vulnerabilities are rated based on their severity which is indicated in the Microsoft's security bulletin as "critical," "important," "moderate, or "low.")
SIM securitySIM-PIN Abfrage (A toggle switch that you tap to enter a SIM PIN)
Windows NT Integrated Securityintegrierte Sicherheit von Windows NT (A security mode that leverages the Windows NT authentication process)