- accidental disclosure
- случайное (неумышленное) раскрытие (существа изобретения)
Тетради новых терминов № 6. Англо-русские патентные термины. - М.: Всесоюзный центр переводов. В.С. Попов, Л.А. Горник, А.М. Школьник. 1975.
Тетради новых терминов № 6. Англо-русские патентные термины. - М.: Всесоюзный центр переводов. В.С. Попов, Л.А. Горник, А.М. Школьник. 1975.
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia
Internet privacy — involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information… … Wikipedia
Data remanence — is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that… … Wikipedia
Coming out — For other uses, see Coming out (disambiguation). Part of a series on Lesbian, gay, bisexual, transgender (LGBT) people Sexual orientation … Wikipedia
Official Secrets Act 1989 — The Official Secrets Act 1989[1] Parliament of the United Kingdom Long title An Act to replace section 2 of the Official Secrets Act 1911 by provisions p … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
leak — [lēk] vi. [ME leken < ON leka, to drip < IE base * leg , to drip, trickle, LACK, OIr legaim, (I) dissolve, Welsh llaith, damp] 1. to let a fluid substance out or in accidentally [the boats leaks] 2. to enter, or escape accidentally from, an … English World dictionary
Zeroisation — In cryptography, zeroisation (also spelled zeroization) is the practice of erasing sensitive parameters (especially keys) from a cryptographic module to prevent their disclosure if the equipment is captured. When encryption was performed by… … Wikipedia
leak — /lik / (say leek) noun 1. an unintended hole, crack, or the like by which fluid, gas, etc., enters or escapes. 2. any avenue or means of unintended entrance or escape, or the entrance or escape itself. 3. Electricity a point where current escapes …
IT risk — Information technology risk, or IT risk, IT related risk, is a risk related to information technology. This relatively new term due to an increasing awareness that information security is simply one facet of a multitude of risks that are relevant … Wikipedia