Created by: al5ha
Number of Blossarys: 1
A digital document that is commonly used for authentication and to help secure information on a network.
An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects.
A rule associated with an object to regulate which users can gain access to the object and in what manner. Permissions are assigned or denied by the object's owner.
다중 사용자 컴퓨터 시스템 또는 망 운용 시스템에서 어떤 특정 사용자가 그의 사용자 계정에 의해 특정한 자원에 접근할 수 있는 권한.
The process of converting encrypted content back into its original form to make it readable again. This is also called converting ciphertext back to plaintext.
The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party.
데이터 전송 시 타인의 불법적인 방법에 의해 데이터가 손실되거나 변경되는 것을 방지하기 위해 데이터를 변환하여 전송하는 방법.