1 |
SECURITYRelationships Related Term: authorization preservation n. ~ Measures taken to protect materials from unauthorized access, change, destruction, or other threats. Citations: †(Personal communication, R [..]
|
2 |
SECURITYPiece of paper that proves ownership of stocks, bonds, and other investments.
|
3 |
SECURITYAn efficient disclosure control method provides protection against exact disclosure or unwanted narrow estimation of the attributes of an individual entity, in other words, a useful technique prevents [..]
|
4 |
SECURITYThe total, essential, or particular being of a person; the individual.
|
5 |
SECURITYmid-15c., "condition of being secure," from Latin securitas, from securus "free from care" (see secure). Replacing sikerte (early 15c.), from an earlier borrowing from Latin; earli [..]
|
6 |
SECURITYAn operating unit that is responsible for protecting merchandise and other assets from pilferage (internal or external). Those working in security may be employees or outside agency people.
|
7 |
SECURITYThe property that is pledged as collateral.
|
8 |
SECURITYReal or personal property that a borrower pledges for the term of a loan. Should the borrower fail to repay, the creditor may take ownership of the property by following legally mandated procedures.
|
9 |
SECURITYstock or bond. A security demonstrates ownership or financial participation in a business or government.
|
10 |
SECURITYsafety or stability.
|
11 |
SECURITYA certificate issued by a company, government or other organisation giving proof that money has been invested in the stock, bonds, debt, options or other derivatives or instruments issued or sold by it. Securities are increasingly held in electronic rather than paper form.
|
12 |
SECURITYTraditionally, a security was a physical document, such as stock or bond certificate, that represented your investment in that stock or bond. But with the advent of electronic recordkeeping, paper certificates have increasingly been replaced by electronic documentation.In current general usage, the term security refers to the stock, bond, or other [..]
|
13 |
SECURITYGenerally, an instrument evidencing debt of or equity in a common enterprise in which an investment is made on the expectation of financial return. The term includes notes, stocks, bonds, debentures o [..]
|
14 |
SECURITYMay mean any one of the following Freedom from danger, i.e. safety. Freedom from fear or anxiety, e.g. from the prospect of being laid off, i.e. job security. Something given, deposited, or pledged to [..]
|
15 |
SECURITYthe state of being free from danger or injury; "we support the armed services in the name of national security" defense against financial failure; financial independence; &am [..]
|
16 |
SECURITYSee: computer system security.
|
17 |
SECURITYThe property used as collateral for a loan.
|
18 |
SECURITYsafety, confidence, protection, a guarantee, a surety
|
19 |
SECURITY1. A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. 2. With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security. [..]
|
20 |
SECURITYThe property that will be pledged as collateral for a loan.
|
21 |
SECURITYJensens Internet Dictionary Protection against error and fraud. In computing and networking this includes firewall protections (e.g., passwords) for entry and encriptions for messages that contain protected data such as credit card numbers. (See also Cryptolope)
|
22 |
SECURITYAn investment instrument such as a stock or bond.
|
23 |
SECURITYCollateral given or pledged to guarantee fulfillment of an obligation (Black’s). Implied is the forfeiture of this collateral if the obligation is not met.
|
24 |
SECURITYDefinitions (2) 1. An investment instrument, other than an insurance policy or fixed annuity, issued by a corporation, government, or other organization which offers evidence of debt or equity. The of [..]
|
25 |
SECURITY(n.) In the computer industry, the term security -- or the phrase computer security -- refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals [..]
|
26 |
SECURITYFeelings of basic safety, assurance, and independence from alarm. In psychology, is regarded to be engendered by such conditions as a comforting, approving support system of family and friends; progre [..]
|
27 |
SECURITYSee Safety on campus
|
28 |
SECURITYIn computing, the technology developed to prevent unauthorized persons, particularly hackers and crackers, from gaining entry to protected systems and files, including data encryption, virus detection [..]
|
29 |
SECURITYA password, key, procedure, or other device which has the ability to limit change in selected parameters. The existence and enforcement of techniques which restrict access to data, and the conditions [..]
|
30 |
SECURITYis a blanket term referring to an instrument (usually just recorded as a piece of paper) that represents financial value, such as stock, bonds, debt securities, funds, options, futures contracts and o [..]
|
31 |
SECURITYpl: -ties 1 a : something (as a mortgage or collateral) that is provided to make certain the fulfillment of an obligation [used his property as for a loan] b : surety see also security for costs 2 ...
|
32 |
SECURITYSomething given or deposited as surety for the payment of debt. In the case of home loans, the property which is to be bought with the loan money usually acts as the security.
|
33 |
SECURITYAny kind of transferable certificate of ownership including EQUITY SECURITIES and DEBT SECURITIES.
|
34 |
SECURITYA pledge made to secure the performance of a contract or the fulfillment of an obligation. Examples of securities include real estate, equipment stocks or a co-signer. Mortgages are a form of security [..]
|
35 |
SECURITYa share, participation, or other interest in property or in an enterprise of the issuer or an obligation of the issuer.
|
36 |
SECURITYA transferable certificate of ownership of an investment product such as a note, bond, stock, futures contract or option. A security can also be defined as “property, which is pledged as collateral for a loan or other credit, and subject to seizure in the event of default.”
|
37 |
SECURITYSpecific revenue sources or assets pledged by an issuer to the bondholder to secure repayment of the bond.
|
38 |
SECURITYIn association with computers, communication systems and automation, the term security is understood to mean any measures used to protect a system from attacks, whether accidental or intentional. The motivation for these attacks may vary, but includes espionage for example, or specific functional impairment through malware such as viruses, worms an [..]
|
39 |
SECURITYServices which protect data, ensuring its confidentiality, availability and integrity.
|
40 |
SECURITYReal estate or personal property used as collateral to back up a loan, which gives the lender tangible property that may be sold upon default to pay off the indebtedness.
|
41 |
SECURITYA pledge made to secure the performance of a contract or the fulfillment of an obligation. Examples of securities include real estate, equipment stocks or a co-signer. Mortgages are a form of security with strong legal standing, because they are publicly registered following a formal legal procedure. A mortgage gives the lender holding a mortgage s [..]
|
42 |
SECURITYThe NZECO may seek a security to ensure that, in the event of a buyer's default, it will be repaid or appropriately compensated. Forms of security include: a bank guarantee; a guarantee from a pa [..]
|
43 |
SECURITYA legal right of access to value through mortgages, contracts, cash accounts, guarantees, insurances, pledges, or cashflow, including licenses, concessions, and other assets. A negotiable certi [..]
|
44 |
SECURITYThe paper right to a (generally tradeable) asset. The term is frequently used as a loose label to refer to all shares, debentures, notes, bills, government and semi-government bonds etc, which are traded on the stock exchange.
|
45 |
SECURITYAn investment instrument, other than an insurance policy or fixed annuity, issued by a corporation, government, or other organization that offers evidence of debt or equity. The official definition, from the Securities Exchange Act of 1934, is, "Any note, stock, treasury stock, bond, debenture, certificate of interest or participation in any p [..]
|
46 |
SECURITYThe collateral taken by the lender to insure against default by the borrower, on the loan.
|
47 |
SECURITYAn asset that guarantees the lender their loan until the loan is repaid in full. Usually the property is offered to secure the loan.
|
48 |
SECURITYAn asset which a borrower uses to secure funding from a lender. In the event that the borrower cannot repay their debt, this asset can be acquired by the lender.
|
49 |
SECURITYA (financial) security is a fungible financial instrument.
|
50 |
SECURITYAn asset that guarantees the lender their loan until the loan is repaid in full. Usually the property is offered to secure the loan.
|
51 |
SECURITYCharge, Mortgage, Lien or Pledge.
|
52 |
SECURITYIn relation to financial assets, a security is an investment such as shares or bonds which can be traded in financial markets.
|
53 |
SECURITYA financial instrument.
|
54 |
SECURITYYou can offer something you own as security or collateral on a loan, making it a secured loan. This could be property or stocks and shares, or something else of value. The lender ‘holds’ this to protect their investment when they lend you money. In return, the debtor often gets a lower interest rate, but people can risk losing their home if they ca [..]
|
55 |
SECURITYA certificate issued by a corporation or government that has a value. Stocks and bonds are the most common securities.
|
56 |
SECURITYProperty - the vehicle in the case of car finance - that a financier can claim in case a borrower defaults on their loan obligation.
|
57 |
SECURITYlegal term for stock or shares
|
58 |
SECURITYAn investment that is represented by a negotiable document issued by a corporation or governmental entity for the purpose of raising capital. A listed security is one that is approved for trading on a [..]
|
59 |
SECURITYProperty which is designed and used as collateral.
|
60 |
SECURITYThe term security--
|
61 |
SECURITYAccording to 122 CFR 12.2 [Title 12 -- Banks and Banking; Chapter I -- Comptroller of the Currency, Department of the Treasury; Part 12 -- Recordkeeping and Confirmation Requirements for Securities Tr [..]
|
62 |
SECURITYmenu Relative Danger Books Java Security Learning More Digital Signing And Encryption Schemes Links Security Holes Relative Danger The most dangerous things are at the top: Opening a file attached to [..]
|
63 |
SECURITYNew stuff that can make your computer and all your data even safer, and for dealing with new nasties online.
|
64 |
SECURITYIn the context of patron training, refers to tools and practices used to prevent unauthorized access of personal data by third parties.
|
65 |
SECURITYDefinitions of system access for end users. Security can be physical (equipment-related), module-related or data-related.
|
66 |
SECURITYproperty which is pledged as collateral for a loan, which can be taken back by the lender if the borrower defaults on the loan
|
67 |
SECURITYis a financial instrument that represents debt, such as a bond, or represents ownership in an entity, (i.e. a stock). A security can be assigned value and traded in financial markets.
|
68 |
SECURITY(also known as Collateral) is property or assets that a lender can take possession of, in the event that a loan cannot be repaid.
|
69 |
SECURITY(n) the state of being free from danger or injury(n) defense against financial failure; financial independence(n) freedom from anxiety or fear(n) a formal declaration that documents a fact of relevanc [..]
|
70 |
SECURITYEnsuring that private information remains private in an atmosphere where all other information is free. Security also means that viruses are prevented from infecting people's systems.
|
71 |
SECURITYEvidence of an investment, either in direct ownership (as with stocks), creditorship (as with bonds), or indirect ownership (as with options).
|
72 |
SECURITYcautela, obses
|
73 |
SECURITYEnhanced Linux - Security-Enhanced Linux (SELinux) is a version of the Linux kernel and utilities, which contains support for mandatory access controls based on the principle of least privilege. It is [..]
|
74 |
SECURITYThe protection of the Nation and its people, vital interests, and way of life. (NPG, PPD-8)
|
75 |
SECURITYAll campuses have a 24 hour security office.
|
76 |
SECURITYA condition safe from unwanted intrusion
|
77 |
SECURITYThe property used as collateral for a loan.
|
78 |
SECURITYCollateral for a debt. For example, accounts receivable may be pledged as security for a loan. Security is a generic term used to refer to a bond, share certificate or other medium or long-term invest [..]
|
79 |
SECURITYCONTAINER SECURITY GUARD / ESCORT
|
80 |
SECURITYSecurity means safety, as well as the measures taken to be safe or protected.
|
81 |
SECURITYThe condition achieved when designated information, material, personnel, activities and installations are protected against espionage, sabotage, subversion and terrorism, as well as against loss or unauthorised disclosure. The term is also applied to those measures necessary to achieve this condition and to the organisations responsible for those m [..]
|
82 |
SECURITYEvidence of an investment, either in direct ownership (as with stocks), creditorship (as with bonds), or indirect ownership (as with options).
|
83 |
SECURITYAn exchangable asset of value, including stocks, bonds, and other financial instruments.
|
84 |
SECURITYA legal right of access to value through mortgages, contracts, cash accounts, guarantees, insurances, pledges or cash flow, including licences, concessions and other assets. Lenders can act on securit [..]
|
85 |
SECURITYCollateral pledged by a bond issuer (debtor) to an investor (lender) to secure repayment of the loan.
|
86 |
SECURITYProperty pledged to the creditor in case of a default on a loan; see collateral.
|
87 |
SECURITYAssets or personal property used as collateral to secure a loan.
|
88 |
SECURITYIn relation to financial assets, a security is an investment such as shares or bonds which can be traded in financial markets.
|
89 |
SECURITYmeans an asset e.g. a car or property, used to secure the loan which can be accessed by the credit provider to repay arrears if you do not meet your obligations.
|
90 |
SECURITYSecurity is an important aspect of wireless networking. Wireless devices normally support multiple security standards previously, the most common standard was WEP (Wired Equivalent Privacy). Recently, [..]
|
91 |
SECURITYProtective measures against unauthorized access to or interference with computer operating systems, Telecommunications, or data structures, especially the modification, deletion, destruction, or relea [..]
|
92 |
SECURITYAccess by all in a community at all times to enough nutritious Food for an active, healthy Life. (from http://www.fns.USDA.gov/fsec/ accessed 4/22/2011)
|
93 |
SECURITYFinancial assistance for the impoverished Elderly through public funding of Programs, services, and individual Income supplements.
|
94 |
SECURITYGovernment sponsored social Insurance Programs.
|
95 |
SECURITYThat which ensures to the satisfaction of the Customs that an obligation to the Customs will be fulfilled. Security is described as "general" when it ensures that the obligations ari [..]
|
96 |
SECURITYA financial instrument such as stock, bond or treasury bill.
|
97 |
SECURITYThe Underwriters subscribing a risk. The Insurers.
|
98 |
SECURITYThe underwriters subscribing a risk.
|
99 |
SECURITYProperty offered as backing for a loan. In the case of mortgages, the property being purchased with the loan usually forms the security for the loan.
|
100 |
SECURITYThe value of the cash, investments or assets you provide to secure your loan.
|
101 |
SECURITYIn the case of mortgages, real estate offered as collateral for the loan.
|
102 |
SECURITYThe protection that’s placed on a file. Security includes various types of accounts to authenticate users, levels of privilege sets to determine what can be done with a file, and authorization of othe [..]
|
103 |
SECURITYBelief in the safety of one's person and position. Security is a driving factor in employee reporting.
|
104 |
SECURITYA general term for a tradable financial instrument.
|
105 |
SECURITYGeneral term for an equity or debt instrument issued by a government or company.
|
106 |
SECURITY(1) an asset traded on a financial market, such as shares or bonds or (2) an asset pledged to ensure the repayment of a loan
|
107 |
SECURITYGeneral term for an equity or debt instrument issued by a government or company.
|
108 |
SECURITYAn investment instrument, other than an insurance policy or fixed annuity, issued by a corporation, government, or other organization that offers evidence of debt or equity. The official definition, f [..]
|
109 |
SECURITYa financial instrument which includes the assumption of debt, (bonds, bills), shares, derivatives (swaps, options, futures). Share Price
|
110 |
SECURITYA condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems. Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that s [..]
|
111 |
SECURITYTechniques and practices that preserve the integrity of computer systems, and digital library services and collections.
|
112 |
SECURITYEssentially, a contract that can be assigned a value and traded. It could be a stock, bond or mortgage debt, for example.
|
113 |
SECURITYA general term that applies to most investment types, including stocks, options, bonds, etc.
|
114 |
SECURITYmeasures taken on entry to the airside area to prevent illegal acts against civil aviation.
|
115 |
SECURITYMeasures taken on entry to the airside area to prevent illegal acts against civil aviation.
|
116 |
SECURITYAny kind of transferable certificate of ownership including equity securities and debt securities.
|
117 |
SECURITYMeasures taken to keep something secure.
|
118 |
SECURITYThe value of the cash, investments or assets you provide to secure your loan.
|
119 |
SECURITYReal or personal property that guarantees the repayment of a loan. The borrower risks losing the property if the loan is not repaid.
|
120 |
SECURITYDocuments representing the right of the bearer to capital or credit. These instruments can be traded and their transfer or endorsement accredits ownership of them or implied rights.
|
121 |
SECURITYSecurity refers to a general environment of law and order; freedom from physical threats.
|
122 |
SECURITYQoS
|
123 |
SECURITY
|
124 |
SECURITY, Techniques for ensuring that data stored in a computer cannot be read or compromised. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism.
|
125 |
SECURITYMeasures taken to keep something protected or safe from viewing, destruction, or manipulation.
|
126 |
SECURITYProcesses, practices, and software that secure health information from unauthorized access, ensuring that the information is not altered and that it is accessible when needed by those authorized.
|
127 |
SECURITYSecurity is where passengers have their possessions checked before they get on their flight. We have to take our shoes off when we go through security.
|
128 |
SECURITYSecurity related products include serial controlled video cameras, remote controlled camera housings, video recorders, Digital Time Lapse Recorders, VCRs, badge readers, access control, security gate controls and related products.
|
129 |
SECURITY an asset that accrues income. It is usually in the form of a contract detailing a debt or equity issued by a corporation, government or other organisation. Classic examples of securities would be government bonds or corporate shares.
|
130 |
SECURITYFile that stores one or more server certificates or root certificates from trusted Certification Authorities.
|
131 |
SECURITYA scheme for adding enough random material to a message so that the message can be encrypted or signed with a primitive. The scheme is defined in RSAES-PKCS 1.5.
|
132 |
SECURITYPersonal Security Environment (PSE) for the SAP System.
|
133 |
SECURITYTo be able to use the security functions provided by SSL and SNC, you must establish trust between the components involved in the communications. Although the basic concepts used here are similar, the [..]
|
134 |
SECURITYA data encryption standard comprised of a three-step data encryption algorithm that evolved from DES, providing greater security because it encrypts, decrypts, and encrypts the data using three keys i [..]
|
135 |
SECURITYIn J2EE Engine IpVerification Manager is used for IP access control - it checks whether a particular IP address has an access permission.
|
136 |
SECURITYA list that specifies which users or system components are allowed to access a resource.
|
137 |
SECURITYCredentials used to access protected resources. An access token is a string representing an authorization issued to the OAuth 2.0 client. Tokens represent specific OAuth 2.0 scopes and durations of ac [..]
|
138 |
SECURITYCollection of permissions used to enforce authorizations in SAP User Management Engine.
|
139 |
SECURITYDeliberate attempt to evade system security and alter the system.
|
140 |
SECURITYA storage location for other users' public-key certificates so that their digital signatures can be verified.
|
141 |
SECURITYA symmetric cryptographic algorithm that has been adopted by the U.S. government as a replacement for the Data Encryption Standard (DES) algorithm for encrypting sensitive, unclassified data.
|
142 |
SECURITYIn SAML 2.0 it is a logical grouping of service providers under a single name. In this grouping, a user authenticated at the identity provider for one service provider can be automatically federated w [..]
|
143 |
SECURITYVersion of the CRL distribution point that may be used if the primary distribution point is not accessible. For example, you can download the certificate revocation list (CRL) to an alternative local [..]
|
144 |
SECURITYForm of logon where users do not have to provide any form of authentication such as user ID and password, client certificate, and so on.
|
145 |
SECURITYThe endpoint of a SAML service provider or identity provider that processes the artifact resolution requests from the assertion consumer service of other providers. This communication takes place dire [..]
|
146 |
SECURITYThe endpoint of a SAML service provider or identity provider that validates and interprets the SAML response or artifact presented by the client (user), requests the resolution of any artifacts, and c [..]
|
147 |
SECURITYTargeted attempt to evade system security to alter the system or to confiscate information.
|
148 |
SECURITYAn element of a Security Assertion Markup Language (SAML) 2.0 assertion that indicates that the SAML asserting party makes no claims about the accuracy or trustworthiness of assertions received by par [..]
|
149 |
SECURITYThe tracking of events as they occur in the system so that a series of events can be reconstructed at a later date.
|
150 |
SECURITYA group of events recorded by the Security Audit Log.
|
151 |
SECURITYA file containing audit information from the Security Audit Log.
|
152 |
SECURITYA security-relevant chronological record or set of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, event or reso [..]
|
153 |
SECURITYThe audit information saved to the audit log.
|
154 |
SECURITYSpecial type of logon ticket with a very limited time period of validity. It is used for authentication for communication between the J2EE Engine and SAP NetWeaver Application Server (ABAP), for the s [..]
|
155 |
SECURITYThe sum of information concerning how an authenticating authority identified a principal, including how this information is protected. In SAML a relying party can request the authentication context in [..]
|
156 |
SECURITYMethod used to authenticate a user or component. Examples supported by SAP systems include:
|
157 |
SECURITYIn SAML 2.0 the authentication policy is set by the service provider and determines if a user must reauthenticate at the identity provider or if the identity provider must authenticate the user withou [..]
|
158 |
SECURITYDefinition on the J2EE Engine of what is required for authentication. This includes:
|
159 |
SECURITYLogin module stack that serves as a template for other components. Any changes made to the original login module stack affect all other components that reference it as a template.
|
160 |
SECURITYRole in the SAP system derived from a portal role. The menu structure and user assignment of the authorization role are assigned by the portal role.
|
161 |
SECURITYServer issuing access tokens to the OAuth 2.0 client after having successfully authenticated a resource owner and obtained authorization.
|
162 |
SECURITYA method of submitting HTML forms with HTTP POST automatically. This is usually done with Javascript.
|
163 |
SECURITYA communication channel that avoids the standard communication channel. For SAML 2.0 the back channel is directly between the identity provider and the service provider. Communication does not go over [..]
|
164 |
SECURITYA security hole in the software or a program that enables an attacker to gain (remote) access to a system or its data. The security hole can be planned or accidental. In both cases, the security hole [..]
|
165 |
SECURITYThe location on the directory server where the directory access service entries.
|
166 |
SECURITYThe simplest form of authentication supported by most Web browsers and Web servers. With this authentication mechanism the client sends the user ID and password to the server in plain text.
|
167 |
SECURITYAuthentication mechanism to be used in case the first authentication mechanism you configured for Single Sign-On, for example, authentication with logon tickets fails. The user is then authenticated u [..]
|
168 |
SECURITYAn attack that requires trying all (or a large fraction of all) possible values until the right value is found.
|
169 |
SECURITYA person who uses software for the purpose of furthering a business process, and not for the purposes of carrying out an administrative or developer task such as a purchaser, a sales representative, o [..]
|
170 |
SECURITYAn identifier for a user when using Secure Network Communications after the name is converted to a standard format.
|
171 |
SECURITYA list that contains the public-key certificates belonging to other users or system components that are trusted.
|
172 |
SECURITYLogon to an SAP system using digital certificates. The actual authentication takes place using public-key technology, for example, using the Secure Sockets Layer (SSL) protocol.
|
173 |
SECURITYThe act of creating a correspondance between users in a system and X.509 certificates for the purpose of enabling Single Sign-On (SSO).
|
174 |
SECURITYA request for a Certification Authority (CA) to issue a public-key certificate to a user or component.
|
175 |
SECURITYThe digitally-signed public-key certificate returned to the person or entity requesting a certificate from a Certification Authority (CA). This digitally-signed certificate corresponds exactly to the [..]
|
176 |
SECURITYService on the AS Java that checks certificate revocation lists to make sure that a given certificate has not been revoked by the issuing Certification Authority (CA).
|
177 |
SECURITYA group of certificates that have been declared to be invalid.
|
178 |
SECURITYAn external instance that issues public-key certificates.
|
179 |
SECURITYA digital document that is used to identify a user or system component.
|
180 |
SECURITYA specific HTTP header.
|
181 |
SECURITYThe act of inserting (malicious) code into a program or Web site. This enables the attacker, who inserts the code, to change the behavior of the program or Web site.
|
182 |
SECURITYIn Security Assertion Markup Language (SAML) 2.0, the host domain of an identity provider discovery service and its common domain cookie.
|
183 |
SECURITYIn SAML 2.0 the common domain cookie (CDC) is a cookie that enables an identity provider to identify itself to a service provider. When a service provider cannot initially identify the identity provid [..]
|
184 |
SECURITYAttribute in a user's profile. Every user belongs to one company only.
|
185 |
SECURITYAn interface implemented by application frameworks called by the OAuth authentication module to derive the corresponding ABAP development object from HTTP requests to URIs.
|
186 |
SECURITYMain CRL distribution point for a Certification Authority (CA). This location is included in the certificates issued by the CA as the CRL distribution point.
|
187 |
SECURITYObject in SAP User Management Engine, for example, user, user account, group, or role.
|
188 |
SECURITYLocation in the public-key infrastructure where the users' and components' public keys are stored.
|
189 |
SECURITYPrivate part of the public and private key pair used for encryption or for digital signatures.
|
190 |
SECURITYContains user data such as e-mail address, language, password. Can be changed by an administrator or the user.
|
191 |
SECURITYAuthentication concept that requires a component to explicitly trigger authentication itself. The authentication process is subsequently controlled by the authentication framework of the container in [..]
|
192 |
SECURITYEvidence that proves a party possesses a private key corresponding to a public key to another party in public-key infrastructure.
|
193 |
SECURITYA user ID that does not include information about the real person that the ID represents.
|
194 |
SECURITYThe mapping of the messages or message patterns of one protocol onto another protocol. In SAML 2.0, for example, the mapping of a SAML authentication request message onto SOAP is a SAML SOAP binding.
|
195 |
SECURITYPublic part of the public-key pair used for encryption or for digital signatures.
|
196 |
SECURITYKey pair that consists of the public and the private keys.
|
197 |
SECURITYA digital document that acts as a user's digital identification card.
|
198 |
SECURITYA series of documents produced and distributed by RSA Laboratories that define standards for using public-key technology.
|
199 |
SECURITYAn encryption method that uses two different, complementary keys for the encryption and decryption of information sent over computer networks.
|
200 |
SECURITYSystem that manages the trust relationships involved with using public-key technology.
|
201 |
SECURITYList that contains the public-key information (to include the public keys) belonging to other users or system components.
|
202 |
SECURITYThe technology used for securing digital documents.
|
203 |
SECURITYAn SAP NetWeaver component used to monitor and log read access to sensitive data.
|
204 |
SECURITYAn application making protected resource requests on behalf of the resource owner and with its authorization.
|
205 |
SECURITYAn OAuth 2.0 scope is determined in negociation between the resource owner and the user who wants to access the resource.
|
206 |
SECURITYA Kerberos realm is the set of Kerberos principals that are registered within a Kerberos server. The Kerberos realm represents an administrative domain that has its own Kerberos database containing in [..]
|
207 |
SECURITYThe inability to deny having performed an action.
|
208 |
SECURITYA type of cross-site scripting attack in which the Web application embeds content received from the HTTP request in its HTTP response. A successful exploitation occurs when the attacker tricks the vic [..]
|
209 |
SECURITYA temporary token used to obtain access tokens. Refresh tokens are issued to the OAuth 2.0 client by the authorization server and used to obtain a new access token when the current access token become [..]
|
210 |
SECURITYAn entity in the public-key infrastructure (PKI) that verifies a certificate request and then passes it on to the Certification Authority (CA).
|
211 |
SECURITYIn SAML 2.0 the content of the RelayState parameter. The SAML service provider uses this parameter to find out the relative path of the application to which the service provider should redirect an inc [..]
|
212 |
SECURITYA token used to refer to a principal in SAML messages.
|
213 |
SECURITYIdentifies the type of information the name identifier includes. The SAML standard defines the formats as follows:
|
214 |
SECURITYUser used for anonymous logon to Java applications such as SAP Enterprise Portal.
|
215 |
SECURITYService available on the mySAP.com Marketplace that issues mySAP.com users their mySAP.com Passports.
|
216 |
SECURITYThe practice of logging on multiple times to the same account from multiple clients.
|
217 |
SECURITYAn entity capable of granting access to a protected resource.
|
218 |
SECURITYHosts the protected resource and is capable of accepting and responding to protected resource requests using access tokens.
|
219 |
SECURITYThe URI to use for Security Assertion Markup Language (SAML) resonse messages.
|
220 |
SECURITYIn SAML 2.0 a temporary identifier for a principal that does not reveal private information about the principal.
|
221 |
SECURITYA basic protocol used by other protocols to communicate through the network.
|
222 |
SECURITYA proposed Internet standard protocol that is an enhancement of the Secure Sockets Layer (SSL) Version 3.0 protocol.
|
223 |
SECURITYA mechanism used by web browsers to determine the content type of a file. The browser parses the first byte of the binary content stream to determine the MIME type of the file.
|
224 |
SECURITYCertificate belonging to a Certification Authority (CA).
|
225 |
SECURITYThe highest Certification Authority in a PKI. All users of the PKI must trust it. Its certificate is signed with a private key. There can be any amount of CAs between a user certificate and the root C [..]
|
226 |
SECURITYWindows NT authentication protocol that uses a challenge and response algorithm for authenticating users within a Windows NT network.
|
227 |
SECURITYMicrosoft's security provider that uses the the Microsoft Windows NT LAN Manager (NTLM) protocol to authenticate users in a Windows NT network.
|
228 |
SECURITYA public-key cryptographic algorithm which can be used both for encrypting messages and creating digital signatures.
|
229 |
SECURITYIdentity with which an EJB is executed. This identity is usually not the identity of the caller.
|
230 |
SECURITYThe representation of a text in the form of a single string of digits, created using a one-way hash function.
|
231 |
SECURITYA message type of the single logout protocol of the SAML 2.0 standard. A provider sends a logout request to initiate a Single Log-Out by an identity provider. An identity provider sends a logout reque [..]
|
232 |
SECURITYA message type of the single logout protocol of the SAML 2.0 standard. A provider sends a logout response to a provider to confirm that it has terminated any sessions with the principal specified in t [..]
|
233 |
SECURITYA message type of the Authentication Request protocol of the Security Assertion Markup Language (SAML). A response message returns SAML assertions to the requesting service provider.
|
234 |
SECURITYA system entity providing a set of web applications with a common session management, identity management, and trust management
|
235 |
SECURITYSAML token profiles are used for WS access authentication at the SOAP message level.
|
236 |
SECURITYA message type of the Artifact Resolution protocol of the Security Assertion Markup Language (SAML). A SAML provider uses an artifact resolution request to retrieve a SAML message referred to by an ar [..]
|
237 |
SECURITYA message type of the Artifact Resolution profile of the Security Assertion Markup Language (SAML). An artifact response includes a SAML message requested by another provider.
|
238 |
SECURITYA collection of statements (though zero statements is possible) made by a SAML authority about a specific principals. According to the SAML standard, these statements can of the following types:
|
239 |
SECURITYA message type of the Authentication Request protocol of the Security Assertion Markup Language (SAML). A SAML service provider uses an authentication request to get information about a principal or a [..]
|
240 |
SECURITYSAML browser artifacts are used as a reference to a SAML protocol message stored on a source site (in SAML 1.x) or a provider (in SAML 2.0). The artifacts are designed to be transferred in a URL. The [..]
|
241 |
SECURITYAn entity that manages identity information for principals and provides authentication services to other trusted service providers.
|
242 |
SECURITYThe sender of SAML assertions with which a user can logon to a system trusting the issuer.
|
243 |
SECURITYThe Certification Authority (CA) provided by the SAP AG that issues certificates to SAP customers.
|
244 |
SECURITYX.509 client certificate issued to SAP customers' end users by the SAP Certification Authority (CA).
|
245 |
SECURITYDefault security provider provided with the SAP System.
|
246 |
SECURITYService provided by SAP from which SAP customers can receive public-key certificates issued by the SAP Certification Authority (CA).
|
247 |
SECURITYA collection of multiple identical virus scanners used for better workload distribution.
|
248 |
SECURITYKey used for encrypting and decrypting messages using symmetric encryption algorithms.
|
249 |
SECURITYAn open industry standard protocol developed for the secure transmission of payment information over the Internet and other electronic networks.
|
250 |
SECURITYInternet-standard that defines a means to make email messages more secure by adding both digital signatures and encryption.
|
251 |
SECURITYInterface that allows secured communication connections between SAP System components. Strong authentication, integrity protection, and privacy protection may be provided.
|
252 |
SECURITYAn Internet standard protocol developed by Netscape that is used to secure communications across the Internet.
|
253 |
SECURITYSecure storage location in which the SAP System to store critical information such as passwords. The data stored in the system's secure storage is encrypted.
|
254 |
SECURITYBAdI implementation to provide application-specific data for managing the secure storage.
|
255 |
SECURITYAn interface that allows the SAP system to protect data and documents using digital signatures and encryption.
|
256 |
SECURITYA tool that produces a log containing security-related system events such as configuration changes or unsuccessful logon attempts.
|
257 |
SECURITYA vulnerability in a computer program that enables a malicious user to gain unauthorized access to data, networks, systems, or functions.
|
258 |
SECURITYSAP Notes that are used to inform customers about a solution or workaround for an existing security issue in shipped SAP software (see SAP Note 1139963). They contain advice including countermeasures [..]
|
259 |
SECURITYThe security constraints over the access to protected resource.
|
260 |
SECURITYSubject confirmation method for system-to-system communication with which a system vouches for the identity of a user. The system forwards this information as part of the SAML assertion to another sys [..]
|
261 |
SECURITYThe name by which a client uniquely identifies an instance of a service.
|
262 |
SECURITYAn XML-based expression syntax for the query and exchange of user account information, for example, users, groups, or roles.
|
263 |
SECURITYA type of attack where one user attempts to set the session ID of another user.
|
264 |
SECURITYA standard pseudo-mechanism, used to determine which GSS API mechanisms are shared, select one and then establish a security context for communication using it.
|
265 |
SECURITYA method used by the Lightweight Directory Access Protocol (LDAP) to authenticate users based on user ID and password.
|
266 |
SECURITYThe capability to terminate all sessions of a specific user or a user agent, such as Web browser, at the click of a single button.
|
267 |
SECURITYA mechanism that eliminates the need for users to enter passwords for every system that they log on to.
|
268 |
SECURITYAn intranet domain that consists of a single level. In user@example, the domain has a single designation, "example." This is incontrast with user@example.com, where there is a top-level doma [..]
|
269 |
SECURITYThe server's Personal Security Environment (PSE) that contains the information needed to establish a connection using Secure Network Communication (SNC).
|
270 |
SECURITYA log where the execution of SQL statements to certain tables are recorded.
|
271 |
SECURITYInjection of malicious SQL statements by an attacker. an SQL Injection is possibe, if statements or parst of statements that imported from the outside into a program, are passed to the database system [..]
|
272 |
SECURITYPerforms a scanning for various threat types, such as viruses, spyware, malware etc.
|
273 |
SECURITYLibrary available to non-SAP applications for authentication purposes and Single Sign-On.
|
274 |
SECURITYA type of cross-site scripting attack in which the attacker stores the injected code or script on a vulnerable server. For example, the malicious code can be contained in a forum message. The maliciou [..]
|
275 |
SECURITYThe process of identifying a user (or component) by proving that the user has knowledge of a secret without the user having to reveal the secret.
|
276 |
SECURITYX.509 certificate attribute that identifies the owner of the certificate.
|
277 |
SECURITYIn public key infrastructure, the subject alternative name (SAN) is an extension of X.509 certificate enabling the certificate issuer to associate additional identities with the subject of a certifica [..]
|
278 |
SECURITYMethod to confirm a subject with SAML token profile authentication.
|
279 |
SECURITYInformation used by the SAP system for Secure Store and Forward (SSF) mechanisms where a user or component's private part of the public-key information is stored (the private key).
|
280 |
SECURITYThe server's Personal Security Environment (PSE) that contains the information needed to establish a connection using the Secure Sockets Layer (SSL) protocol, where the server is the client compo [..]
|
281 |
SECURITYIdentity that the server uses for a specific SSL connection. The server can have multiple SSL server identities. Each SSL server identity possesses its own SSL server Personal Security Environment (PS [..]
|
282 |
SECURITYThe server's Personal Security Environment (PSE) that contains the information needed to establish a connection using the Secure Sockets Layer (SSL) protocol, where the server is the server compo [..]
|
283 |
SECURITYThe Personal Security Environment (PSE) used for Single Sign-On (SSO) in the mySAP Workplace when using logon tickets.
|
284 |
SECURITYJava class defined by the Java Authentication and Authorization Service (JAAS) that defines the authentication logic for a particular authentication mechanism. For example, the Basic Authentication lo [..]
|
285 |
SECURITYList of login modules containing authentication logic that is assigned to a component. When a user is authenticated on the J2EE Engine, the server sequentially processes the login module stack that ap [..]
|
286 |
SECURITYThe URI to use to contact the Single Sign-On endpoint of the provider to the Security Assertion Markup Language (SAML) 2.0 standard.
|
287 |
SECURITYThe name of the destination (as part of the destination service of the SAP NetWeaver Application Server) to use to contact the Single Sign-On endpoint of the provider according to the Security Asserti [..]
|
288 |
SECURITYA program or script written to harm, compromise, or hinder a computer system, its applications, or its users.
|
289 |
SECURITYAn attack in which an attacker inserts itself between two parties and pretends to be one of the parties.
|
290 |
SECURITYThe act of enabling a user to link his or her user account on a remote system with his or her user account on the local system during logon.
|
291 |
SECURITYSecure location where a user or component's public-key information is stored.
|
292 |
SECURITYA secret known by a user used to confirm his or her identity, such as a numeric password.
|
293 |
SECURITYThe exchange of information or agreement between administrators of SAML providers on how to link user accounts between systems. For example, what data does the identity provider pass to the service pr [..]
|
294 |
SECURITYAdministrator that can add, modify and delete users of all companies.
|
295 |
SECURITYPAOS is a reverse HTTP-binding for the SOAP protocol. It is a reverse binding because the HTTP response is bound the SOAP request instead of the HTTP request.
|
296 |
SECURITYPassword that is longer than a traditional password and may consist of more than one word.
|
297 |
SECURITYA deliberate attempt to evade security to gain information from a system, for example, wiretapping or other forms of eavesdropping.
|
298 |
SECURITYCredentials contain data that enables the subject to perform certain activities. A credential may contain information, which is used to authenticate the subject to new services. These credentials have [..]
|
299 |
SECURITYThe user or component-specific information that allows the user or component to access his or her security information.
|
300 |
SECURITYLocal storage location for each certification revocation list (CRL) that is downloaded from a CRL distribution point.
|
301 |
SECURITYPublicly available location where a Certification Authority (CA) hosts its certificate revocation list (CRL).
|
302 |
SECURITYThe act of serving content from or diverting a Web client to a different domain without the user's knowledge.
|
303 |
SECURITYAnalysis procedure for decrypting encrypted messages sent over computer networks without knowing the key.
|
304 |
SECURITYA class of attacks against application servers that tricks an authenticated user into issuing HTTP requests to an application, which can then lead to an undesired action being triggered on behalf of t [..]
|
305 |
SECURITYA cryptographic algorithm that uses a 56-bit secret key for encrypting and decrypting messages (symmetric cryptrography).
|
306 |
SECURITYCorrectness and appropriateness of the content and/or source of data sent over the Internet.
|
307 |
SECURITYThe data being transferred between the client and the server is encrypted, which provides for integrity and privacy protection. An eavesdropper cannot access or manipulate the data.
|
308 |
SECURITYThe data repository from which the User Management Engine (UME) of the J2EE Engine retrieves user management data such as user, group, and role data.
|
309 |
SECURITYAuthentication concept that releases a component from having to trigger authentication itself. Instead the component declares its protected resources and its desired authentication mechanism in its de [..]
|
310 |
SECURITYThe conversion of an encoded message into its original form.
|
311 |
SECURITYThe process of retrieving data that has been encrypted using a cryptographic algorithm.
|
312 |
SECURITYIn identity management this is the action of ending federation. Here federation provides the means to share identity information between partners. To share information about a user, partners must be a [..]
|
313 |
SECURITYAllows you to distribute user administration between several administrators so that each administrator is responsible for a particular group of users.
|
314 |
SECURITYAdministrator that can add, modify and delete users that belong to the same company as the delegated user administrator only.
|
315 |
SECURITYAn area that exists between two networks that allows connections between the networks without sacrificing unauthorized access to the systems located within the networks.
|
316 |
SECURITYThe process of opening a digital envelope.
|
317 |
SECURITYSecurity protocol that allows parties with no prior knowledge of each other to agree on a shared key for encrypting further communication.
|
318 |
SECURITYA security mechanism for protecting digital data.
|
319 |
SECURITYProcess of identifying a person or system component using a cryptographic hash value to avoid sending the user ID and password in clear text.
|
320 |
SECURITYAn electronic "identity card" that establishes a user's credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA) and contains nam [..]
|
321 |
SECURITYTree-like structure in which entries in a directory are organized.
|
322 |
SECURITYA type of attack during which the attacker exploits a flaw in the security of an application to gain access to directories. An attacker can then read or insert data.
|
323 |
SECURITYA hierarchical identifier for an object as specified by the X.500 format.
|
324 |
SECURITYDocument domain defines the circumstances in which two different applications can share information between two different windows or frames on the client side. The Same Origin Policy (SOP) applies. Tw [..]
|
325 |
SECURITYDocument domain relaxing is the loosing of the Same Origin Policy (SOP).The SOP states that two applications in two different frames or windows can share information only if the protocol, fully-qualif [..]
|
326 |
SECURITYA group of computers and devices that belong to the same (sub-)network according to their IP addresses (or corresponding aliases).
|
327 |
SECURITYA cryptographic procedure introduced by SET, an electronic payment system, to ensure data protection during business transactions.
|
328 |
SECURITYThe conversion of a plain-text message into a coded message using an algorithm where no cryptography is involved.
|
329 |
SECURITYThe process of using a cryptographic algorithm to disguise a message to protect it from being intercepted by potential eavesdroppers.
|
330 |
SECURITYA profile of the Security Assertion Markup Language (SAML) 2.0. The profile enables browsers with enhanced capabilities to take advantage of identity provider discovery and SAML message flow options. [..]
|
331 |
SECURITYChargeable software component that is not exclusively calculated for each user.
|
332 |
SECURITYA component of the SAP NetWeaver Single Sign-On product that enables users to automatically log on to Windows, Windows applications,and web sites.
|
333 |
SECURITYThe process of creating a digital envelope.
|
334 |
SECURITYPart of SAP User Management Engine that provides connectivity to the user management data sources. It allows the persistence manager to access data from a certain type of data source, for example, LDA [..]
|
335 |
SECURITYPart of SAP User Management Engine between the application programming interface and the user management data sources.
|
336 |
SECURITYIn SAML 2.0 an permanent identifier for a principal that does not reveal private information about the principal.
|
337 |
SECURITYTo associate or link a number of entities.
|
338 |
SECURITYA function that is secured with the Secure Sockets Layer (SSL) protocol.
|
339 |
SECURITYA special server in computer networks that prevents unauthorized penetration (dialling in) of external people and/or the transfer of data that is not to be transferred.
|
340 |
SECURITYA communication channel that uses the standard communication channel. For SAML 2.0, the front channel is between the identity provider and theservice providers, but goes over the user agent (such as a [..]
|
341 |
SECURITYAn application level interface (API) for network security systems.
|
342 |
SECURITYGerman Federal office that is responsible for information technology
|
343 |
SECURITYA set of users with specified security permissions.
|
344 |
SECURITYA physical device that can be attached to a server to provide a means for storing digital keys and for performing cryptographic functions.
|
345 |
SECURITYAn algorithm that you can apply to a message or text that guarantees the message's integrity.
|
346 |
SECURITYSubject confirmation method for desktop-to-server communication where a central security token service (STS) asserts the identity of a user. The STS issues a SAML token containing this information. Th [..]
|
347 |
SECURITYRole that contains the central functions for the end user in SAP NetWeaver Business Client (NWBC).
|
348 |
SECURITYA connection which provides for encrypted communications between the client and the server.
|
349 |
SECURITYThe act of determining which SAML identity provider to use when a client requests access to a particular resource of the SAML service provider.
|
350 |
SECURITYThe act of joining the identity data of a principal across multiple systems through the use of a common token.
|
351 |
SECURITYAn organization for developing Internet standards.
|
352 |
SECURITYPiece of information used for user authentication and Single Sign-On with SAP systems.
|
353 |
SECURITYDigital certificate attribute where the Distinguished Name of the Certification Authority (CA) that issued the digital certificate is specified.
|
354 |
SECURITYA class object in the Java Authentication and Authorization Service (JAAS). The subject identifies a person or service or other entity in the JAAS framework. The subject can include principals, such a [..]
|
355 |
SECURITYOne of a collection of connections held ready-for-use when a connection between systems is required.
|
356 |
SECURITYThe set of security restrictions for a component on the J2EE Engine. This includes the login module stack, security roles, and resources that are assigned to the component.
|
357 |
SECURITYA token endpoint is used by the OAuth 2.0 client to obtain an access token presenting its authorization grant or refresh token.
|
358 |
SECURITYSAP System tool (transaction SSO2) to assist you with the configuration of logon tickets for Single Sign-On (SSO).
|
359 |
SECURITYAlert in the Computing Center Management System (CCMS) alert monitor that has been produced by the Security Audit Log.
|
360 |
SECURITYA cryptographic procedure in which the sender and receiver use the same key to encrypt and decrypt a message sent over computer networks.
|
361 |
SECURITYDefault security product provided by SAP to use for encryption with SAP Systems.
|
362 |
SECURITYA popular program used to encrypt and decrypt e-mail over the Internet.
|
363 |
SECURITYSecurity mechanism that protects a message from being viewed by anyone other than the intended recipient.
|
364 |
SECURITYA condition that occurs when a system or server, for example, is flooded with requests or data, causing its resources to be exhausted and making it inaccessible or unable to function.
|
365 |
SECURITYA location in the SAP Web Application Server ABAP database where you can store certificates belonging to Certification Authorities (CAs).
|
366 |
SECURITYA process of identifying a person or system component, usually as a prerequisite for allowing the person or component access to the system.
|
367 |
SECURITYThe report generated from the Security Audit Log.
|
368 |
SECURITYThe mapping of accounts in different systems to the same principal, so that both systems can communicate about that principal.
|
369 |
SECURITYAn authentication system developed at the Massachusetts Institute of Technology (MIT).
|
370 |
SECURITYThe Kerberos Principal Name identifies a Kerberos user or a Kerberos service.
|
371 |
SECURITYServer used in a Kerberos scenario that authenticates users and issues them their tickets.
|
372 |
SECURITYA keytab file contains a list of Kerberos keys. Keytab files are used to provide Kerberos identities to services (compared to user principals whose keys can be generated from a password at the beginni [..]
|
373 |
SECURITYThe LDAP Connector interface is a collection of function modules with which you can access a directory server using the LDAP Connector. The function modules are geared to the operations available in t [..]
|
374 |
SECURITYIn RBAM, the POP method removes the topmost element from the stack. This happens when the call - for which this element was put onto the stack (PUSH) # is finished.
|
375 |
SECURITYA role defined in a portal.
|
376 |
SECURITYIdentity that the server acts under for a Web service for security purposes. Each WS-Security identity possesses its own WS-Security Personal Security Environment (PSE).
|
377 |
SECURITYPersonal Security Environment (PSE) to use for Web services.
|
378 |
SECURITYA set of criteria for evaluating computer security.
|
379 |
SECURITYTool for centrally consolidating license auditing data.
|
380 |
SECURITYWindows authentication, with which Windows performs a permissible authentication (for example, with NTLM or Kerberos).
|
381 |
SECURITYA user that exists only in the main memory of the application and is not saved as a record in the user data source. This user is created programmatically to fulfill a special purpose in connection wit [..]
|
382 |
SECURITYList of steps that are to be processed during a scan.
|
383 |
SECURITYExecutable program that integrates the virus scanner of a certified vendor using an interface and provides scan services to the application servers of the system as a registered RFC server.
|
384 |
SECURITYA private data network that makes use of the public telecommunication infrastructure and maintains privacy through the use of a tunneling protocol and security procedures.
|
385 |
SECURITYA guest user that exists only in program memory. Such a guest user is created programmatically and is not saved as a user record in the user data source.
|
386 |
SECURITYA security token that is defined in the WS Security standard. It is a mechanism with which the user ID and password can be transported within a SOAP message.
|
387 |
SECURITYService provider in the J2EE Engine that stores user management data such as user and group data.
|
388 |
SECURITYThe name of a system user in an e-mail address format. The user name (or"username") is followed by the "at sign" followed by the name of the Internet domain with which the user is [..]
|
389 |
SECURITYA Java-based user management component that features centralized user management, Single Sign-On (SSO), and secure access to distributed applications.
|
390 |
SECURITYAn instrument representing ownership (stocks), a debt agreement (bonds) or the rights to ownership (derivatives).
|
391 |
SECURITYThe property that will be pledged as collateral for a loan.
|
392 |
SECURITYA security is a charge or mortgage taken on assets [i.e. a house] in order to secure payment of debt. Shadow Director
|
393 |
SECURITYA charge or mortgage over assets taken to secure a payment of a debt. If the debt is not paid, the lender has a right to sell the charged assets. The commonest example is a mortgage over a property.
|
394 |
SECURITYA charge or mortgage over assets taken to secure payments of a debt. If the debt is not paid, the lender has a right to sell the charged assets. Security documents can be very complex. The commonest e [..]
|
395 |
SECURITYA security is a charge or mortgage over assets taken to secure payment of a debt. If the debt is not paid, the lender has a right to sell the charged assets. The commonest example is a mortgage over a [..]
|
396 |
SECURITYProtection from harm. In eCommerce terms, security is ensuring that transactions are not open to fraud. In eCommerce systems, security protocols protect the consumer, the merchant and the bank from ha [..]
|
397 |
SECURITYThe property that will be pledged as collateral for a loan.
|
398 |
SECURITYA security offers protection that an obligation will be met. A developer may be required to post a security, such as a bond or a letter of credit, as a means of recourse should he or she fail to compl [..]
|
399 |
SECURITY24hr desk clerk / security staff; offers assistance to persons who may request accompaniment to their room; offers secure storage facilities for guests' valuables. Smoke detectors
|
400 |
SECURITY – A document issued by a party acceptable to market participants, offering evidence of ownership of an asset whereby possession of the document signifies ownership. Transfer of ownership requires the presentation or handing over of the security. More generally the term is applied to all shares, debentures, notes, bills, government and semi-governm [..]
|
401 |
SECURITYInstrument that signifies an ownership position in a corporation (a stock), a creditor relationship with a corporation or governmental body (a bond), or rights to ownership (e.g., option).
|
402 |
SECURITYa tradable financial instrument such as a stock, bond or option
|
403 |
SECURITYthe ability of software to operate in a manner that is secure from internal or external attack
|
404 |
SECURITYlang=en
1600s=1678
|1800s=1813 1843 * '''1678''' — . ''''. *: Then I stepped to him that plucked him out, and said, Sir, wherefore, since over this place is the way from the City of Destruction [..]
|
405 |
SECURITYThe property that will be pledged as collateral for a loan. If the borrower defaults, the lender can sell the collateral to satisfy the debt.
|
406 |
SECURITYproperty pledged to ensure payment of a debt; collateral
|
407 |
SECURITYThe state of being free from danger or threat
|
408 |
SECURITYPiece of paper that proves ownership of stocks, bonds, and other investments.
|
409 |
SECURITYSecurity is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social gro [..]
|
410 |
SECURITYSecurity is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social gro [..]
|
411 |
SECURITYSecurity is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social gro [..]
|
412 |
SECURITYA security is a tradable financial asset. The term commonly refers to any form of financial instrument, but its legal definition varies by jurisdiction. In some countries and languages the term "secur [..]
|
413 |
SECURITYA security is a tradable financial asset. The term commonly refers to any form of financial instrument, but its legal definition varies by jurisdiction. In some countries and languages the term "secur [..]
|
414 |
SECURITYSecurity is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social gro [..]
|
415 |
SECURITYSecurity is the degree of protection against danger, damage, loss, and crime.
Security may also refer to:
Airport security
Computer security
Energy security
Food security
Individual security, a huma [..]
|
<< SECURED LOAN | SEMIDETACHED HOUSING >> |