20.01.2013 Views

Valtionhallinnon tietoturvakäsitteistö - Valtiovarainministeriö

Valtionhallinnon tietoturvakäsitteistö - Valtiovarainministeriö

Valtionhallinnon tietoturvakäsitteistö - Valtiovarainministeriö

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

tiger turvaohjelma<br />

◮ cracker, cracking program, data protection software,<br />

filter, malicious program, ping packet,<br />

samurai, security monitor, spam filter, spam trap,<br />

vulnerability, white hat � anti-virus program, honeypot,<br />

intrusion detection system, trap (s), virus<br />

protection software, virus scanner<br />

time bomb aikapommi<br />

� bomb, malicious program, rogue program<br />

◮ watchdog timer<br />

time stamp aikaleima<br />

� notarization, stamp (s) ◮ nonrepudiation<br />

time stamp server aikaleimapalvelin<br />

� authentication server, server<br />

time stamp service aikaleimapalvelu<br />

� network service, public key infrastructure, service,<br />

trusted (third) party ◮ network notary<br />

time-out aikakatkaisu<br />

� operation(s) ◮ watchdog timer<br />

TLD top level domain (name)<br />

ylätason verkkoalue tai -tunnus<br />

token poletti<br />

� authentication, security module, smart key, verification<br />

tolerant sietoinen; sietävä<br />

◮ resilient � fault tolerant<br />

top secret erittäin salainen<br />

� secret (a), security classification ◮ official document<br />

trace packet jäljityspaketti<br />

� network management, packet ◮ network trace,<br />

traceability<br />

traceability jäljitettävyys<br />

� property ◮ audit trail, auditability, repeatability,<br />

trace packet<br />

trail jälki; ketju<br />

� audit trail<br />

trap (s) ansa<br />

� security monitor, tiger ◮ cracker, cyberhacker,<br />

decoy, intrusion detection system, quarantine (v)<br />

� entrap, honeypot, spam trap<br />

trap door salaovi<br />

� access (s), loophole, passive attack, security<br />

breach ◮ back door, covert channel, entrap,<br />

loophole, security breach, Trojan horse<br />

trigger (s) liipaisin<br />

� computer virus, logic bomb, virus ◮ fault<br />

threshold, payload<br />

Trojan horse troijanhevonen<br />

� malicious program, rogue program ◮ computer<br />

virus, root kit, trap door, virus<br />

TIETOTURVAKÄSITTEISTÖ<br />

trusted luotettava; uskottu<br />

◮ secure (v)<br />

trusted device varmalaite<br />

◮ secure device, security module � authorization<br />

terminal<br />

trusted (third) party luotettu taho<br />

� confidentiality, reliability ◮ audit (s), (public) authority,<br />

certificate authority, Electronic Signatures<br />

Act, escrow, public key infrastructure � accreditation,<br />

certificate, network notary, time stamp service<br />

TTP trusted third party<br />

luotettu taho<br />

tunneling tunnelointi<br />

� data network<br />

U<br />

UCE unsolicited commercial e-mail<br />

mainosroskaposti<br />

� SPAM<br />

unauthorized luvaton<br />

� authorize, rule ◮ illegal � pirate copy<br />

unauthorized user luvaton käyttäjä<br />

� authorization, usage rights, user ◮ authorized<br />

user, cybersquatting, derf, illegal disclosure, intrusion,<br />

penetration, skim, war driving<br />

unavailability käytettävyyden estyminen<br />

� availability ◮ congestion, denial of service<br />

unidentified use tunnisteeton käyttö<br />

� identify, use ◮ anonymity server, anonymous<br />

use, identifier, label<br />

uninterrupted power supply katkoton tehonsyöttö<br />

� availability, operations security ◮ no-break<br />

power supply<br />

usability käytettävyys (2); käyttökelpoisuus<br />

� property ◮ availability, integrity, serviceable<br />

usage rights käyttövaltuudet<br />

� authority, right ◮ access right, authorization<br />

� access authority, unauthorized user<br />

USB key USB-avain<br />

� dongle, hardware key, key, security module,<br />

smart key<br />

use käyttö (1)<br />

� information system ◮ utilization � access<br />

right, anonymous use, authority, availability, hacking,<br />

multi-use smart card, remote access, remote<br />

login, restricted use, unidentified use<br />

101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!