英文 | 中文 | 簡稱 |
---|---|---|
access control decision function | 訪問控制判決功能 | ADF |
access control decision information | 訪問控制判決信息 | ADI |
access control enforcement function | 訪問控制實施功能 | AEF |
access control entries | 訪問控制入口 | ACE |
access control information | 訪問控制信息 | |
access control list | 訪問控制列表 | ACL |
account security | 賬戶安全 | |
advance persistent threat | 高級持續性威脅 | APT |
agile development | 敏捷開發 | |
anti-phishing project | 反釣魚項目 | |
api security | 接口安全 | |
application programming interface | 應用編程接口 | API |
artificial intelligent | 人工智能 | AI |
assets management | 資產管理 | |
asynchronous transfer mode | 異步傳輸模式 | |
attribute-based access control | 基於屬性的訪問控制模型 | ABAC |
authentication authorization accounting | 認證、授權、計帳 | 3A |
authentication authorization accounting audit | 統一安全管理平臺解決方案 | 4A |
back-end system | 後端系統 | |
border gateway protocol | 邊界網關協議 | BGP |
bring your own device | 攜帶自己的辦公設備 | BYOD |
business assessment | 業務評估 | BA |
business continuity institute | 業務持續性協會 | BCI |
business continuity management | 業務連續性管理 | BCM |
business continuity planning | 業務連續性計劃 | BCP |
business email compromise | 商業郵件失陷 | |
business impact assessment | 業務影響評估 | BIA |
business security | 業務安全 | |
captcha security | 驗證碼安全 | |
capture the flag | 奪旗賽 | CTF |
certificate | 證書 | CA |
chain of blocks | 區塊鏈 | |
cloud access security broker | 雲訪問安全代理 | CASB |
cloud security | 雲安全 | |
cloud security posture management | 雲安全配置管理 | CSPM |
cloud workload protection platforms | 雲工作負載保護平臺 | CWPP |
code audit | 代碼審計 | |
common body of knowledge | 通用知識協議 | CBK |
complex event process | 複雜事件驅動 | CEP |
confidentiality integrity availability | 保密性 完整性 可用性 | CIA |
container security | 容器安全 | |
content disarm and reconstruction | 內容拆解與重建 | |
continuous delivery or development | 持續交付或部署 | CD |
continuous integration | 持續集成 | CI |
cryptography | 密碼學 | |
cyber security | 網絡空間安全 | |
data encryption standard | 數據加密標準 | DES |
data lifecycle management | 數據生命週期管理 | DLM |
data loss prevention | 數據丟失保護 | DLP |
data mining | 數據挖掘 | |
data security | 數據安全 | |
denial of service | 拒絕服務 | DoS |
deception | 欺騙技術 | |
development security operations | DevSecOps | |
disaster recovery planning | 災難恢復計劃 | DRP |
discretionary access control | 自主訪問控制 | DAC |
distributed denial of service | 分佈式拒絕服務 | DDoS |
domain name system | 域名服務 | DNS |
elastic and scalable | 彈性可伸縮 | |
elastic computing | 彈性計算 | |
endpoint detection and response | 終端檢測與響應 | EDR |
endpoint protection platform | 終端防護平臺 | EPP |
endpoint security | 終端安全 | |
enterprise mobility management | 企業移動管理 | EMM |
enterprise resource planning | 企業資源計劃 | ERP |
enterprise risk management | 企業風險管理 | ERM |
extraction transformation loading | 提取 轉化 加載 | ETL |
file transfer protocol | 文件傳輸協議 | FTP |
firewall | 防火牆 | |
free computing | 自由計算 | |
front-end system | 前端系統 | |
general data protection regulation | 一般數據保護條例 | GDPR |
governance risk and compliance | 治理風險與合規性 | |
high availability | 高可用性 | HA |
human computer interaction | 人機交互 | HCI |
human machine interface | 人機界面 | HMI |
identify access management | 身份識別與訪問控制 | IAM |
incident response | 事件響應 | |
industrial control system | 工業控制系統 | ICS |
information technology infrastructural library | IT基礎結構 | ITIL |
infrastructure security | 基礎設施安全 | |
internet of things | 物聯網 | IOT |
intrusion detection system | 入侵檢測系統 | IDS |
intrusion prevention system | 入侵防禦系統 | IPS |
load balancing | 負載均衡 | |
log analysis | 日誌分析 | |
managed detection and response | 可管理檢測與響應 | MDR |
mandatory access control | 強制訪問控制 | MAC |
maximum tolerable downtime | 最長停機時間 | MTD |
maximum tolerable period disruption | 最長中斷時間 | MTPD |
mean time between failure | 平均故障時間間隔 | MTBF |
mean time to repair | 平均修復時間 | MTTR |
mobile application management | 移動應用管理 | MAM |
mobile content management | 移動內容管理 | MCM |
mobile device management | 移動設備管理 | MDM |
monitoring | 監控 | |
multi factor authentication | 多因素認證 | MFA |
network access control | 網絡准入控制 | NAC |
network security | 網絡安全 | |
network traffic analysis | 網絡流量分析 | NTA |
one-time password | 一次性密碼 | OTP |
open source security information management | 開源安全信息管理 | OSSIM |
open web application security project | Web應用程序安全項目 | OWASP |
optical character recognition | 文字識別 | OCR |
penetration testing | 滲透測試 | |
personal identifiable information | 個人身份信息 | PII |
personal identification number | 個人識別號 | PIN |
privileged account management | 特權賬戶管理 | PAM |
proof of concept | 概念驗證 | POC |
proxies | 代理 | |
public key infrastructure | 公鑰基礎設施 | PKI |
recovery point objective | 恢復點目標 | RPO |
recovery time objective | 恢復時間目標 | RTO |
return on investment | 投資回報率 | ROI |
risk assessment | 風險評估 | |
risk and vulnerability assessment | 風險與漏洞評估 | |
risk management | 風險管理 | |
risk management framework | 風險管理框架 | RMF |
role-based access control | 基於角色的訪問控制 | RBAC |
routers | 路由器 | |
runtime application self protection | 程序運行自我保護 | RASP |
search processing language | 搜索處理語言 | SPL |
security domain | 安全域 | |
secure email gateway | 安全郵件網關 | SEG |
security awareness | 態勢感知 | SA |
security development lifecycle | 安全開發生命週期 | SDL |
security event management | 安全事件管理 | SEM |
security incident | 安全事故 | |
security information and event management | 安全信息與事件管理 | SIEM |
security information management | 安全信息管理 | SIM |
security isolation | 安全隔離 | |
security operation center | 安全運營中心 | SOC |
security orchestration automation and response | 安全編排和自動化響應 | SOAR |
security response center | 安全響應中心 | SRC |
security testing | 安全測試 | |
service leve agreement | 服務界別協議 | SLA |
service oriented architecture | 面向服務的體系結構 | SOA |
single sign on | 單點登錄 | SSO |
software composition analysis | 軟件成分分析 | SCA |
software defined network | 軟件定義網絡 | SDN |
software defined perimeter | 軟件定義邊界 | SDP |
software defined security | 軟件定義安全 | SDS |
switches | 交換機 | |
threat intelligence | 威脅情報 | TI |
total cost of ownship | 總擁有成本 | TCO |
trojan horse | 特洛伊木馬 | |
trusted computing base | 可信計算基 | |
trusted third stamp | 可信第三方 | |
two factor authentication | 雙因素認證 | |
unified endpoint management | 統一端點管理 | UEM |
unified identity management | 統一身份管理 | UIM |
unified threat management | 統一威脅管理 | UTM |
user and entity behavior analytics | 用戶和事件行爲分析 | UEBA |
virtual private network | 虛擬專用網絡 | VPN |
wireless access point | 無線訪問接入點 | WAP |
work recovery time | 工作恢復時間 | WRT |
zero trust | 零信任 |
網絡安全方面的專業詞彙中英文對照
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.