Meaning SECURITY
What does SECURITY mean? Here you find 415 meanings of the word SECURITY. You can also add a definition of SECURITY yourself

1

0 Thumbs up   0 Thumbs down

SECURITY


Relationships Related Term:  authorization preservation n. ~ Measures taken to protect materials from unauthorized access, change, destruction, or other threats. Citations: †(Personal communication, R [..]
Source: www2.archivists.org

2

0 Thumbs up   0 Thumbs down

SECURITY


Piece of paper that proves ownership of stocks, bonds, and other investments.
Source: nasdaq.com

3

0 Thumbs up   0 Thumbs down

SECURITY


An efficient disclosure control method provides protection against exact disclosure or unwanted narrow estimation of the attributes of an individual entity, in other words, a useful technique prevents [..]
Source: stats.oecd.org

4

0 Thumbs up   0 Thumbs down

SECURITY


The total, essential, or particular being of a person; the individual.
Source: hrusa.org

5

0 Thumbs up   0 Thumbs down

SECURITY


mid-15c., "condition of being secure," from Latin securitas, from securus "free from care" (see secure). Replacing sikerte (early 15c.), from an earlier borrowing from Latin; earli [..]
Source: etymonline.com

6

0 Thumbs up   0 Thumbs down

SECURITY


An operating unit that is responsible for protecting merchandise and other assets from pilferage (internal or external). Those working in security may be employees or outside agency people.
Source: ama.org (offline)

7

0 Thumbs up   0 Thumbs down

SECURITY


The property that is pledged as collateral.
Source: realestate.co.nz (offline)

8

0 Thumbs up   0 Thumbs down

SECURITY


Real or personal property that a borrower pledges for the term of a loan. Should the borrower fail to repay, the creditor may take ownership of the property by following legally mandated procedures.
Source: experian.com

9

0 Thumbs up   0 Thumbs down

SECURITY


stock or bond. A security demonstrates ownership or financial participation in a business or government.
Source: nationalgeographic.org

10

0 Thumbs up   0 Thumbs down

SECURITY


safety or stability.
Source: nationalgeographic.org

11

0 Thumbs up   0 Thumbs down

SECURITY


A certificate issued by a company, government or other organisation giving proof that money has been invested in the stock, bonds, debt, options or other derivatives or instruments issued or sold by it. Securities are increasingly held in electronic rather than paper form.
Source: glossary.reuters.com (offline)

12

0 Thumbs up   0 Thumbs down

SECURITY


Traditionally, a security was a physical document, such as stock or bond certificate, that represented your investment in that stock or bond. But with the advent of electronic recordkeeping, paper certificates have increasingly been replaced by electronic documentation.In current general usage, the term security refers to the stock, bond, or other [..]
Source: finance.yahoo.com (offline)

13

0 Thumbs up   0 Thumbs down

SECURITY


Generally, an instrument evidencing debt of or equity in a common enterprise in which an investment is made on the expectation of financial return. The term includes notes, stocks, bonds, debentures o [..]
Source: msrb.org

14

0 Thumbs up   0 Thumbs down

SECURITY


May mean any one of the following Freedom from danger, i.e. safety. Freedom from fear or anxiety, e.g. from the prospect of being laid off, i.e. job security. Something given, deposited, or pledged to [..]
Source: maxwideman.com

15

0 Thumbs up   0 Thumbs down

SECURITY


the state of being free from danger or injury; "we support the armed services in the name of national security" defense against financial failure; financial independence; &am [..]
Source: google-dictionary.so8848.com

16

0 Thumbs up   0 Thumbs down

SECURITY


See: computer system security.
Source: fda.gov

17

0 Thumbs up   0 Thumbs down

SECURITY


The property used as collateral for a loan.
Source: golfandhome.co (offline)

18

0 Thumbs up   0 Thumbs down

SECURITY


safety, confidence, protection, a guarantee, a surety
Source: eenglish.in

19

0 Thumbs up   0 Thumbs down

SECURITY


1. A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences.  2. With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security.  [..]
Source: atis.org (offline)

20

0 Thumbs up   0 Thumbs down

SECURITY


The property that will be pledged as collateral for a loan.
Source: realestateabc.com (offline)

21

0 Thumbs up   0 Thumbs down

SECURITY


Jensens Internet Dictionary Protection against error and fraud. In computing and networking this includes firewall protections (e.g., passwords) for entry and encriptions for messages that contain protected data such as credit card numbers. (See also Cryptolope)
Source: comptechdoc.org (offline)

22

0 Thumbs up   0 Thumbs down

SECURITY


An investment instrument such as a stock or bond.
Source: investor.gov (offline)

23

0 Thumbs up   0 Thumbs down

SECURITY


Collateral given or pledged to guarantee fulfillment of an obligation (Black’s). Implied is the forfeiture of this collateral if the obligation is not met.
Source: pretrial.org

24

0 Thumbs up   0 Thumbs down

SECURITY


Definitions (2) 1. An investment instrument, other than an insurance policy or fixed annuity, issued by a corporation, government, or other organization which offers evidence of debt or equity. The of [..]
Source: investorwords.com

25

0 Thumbs up   0 Thumbs down

SECURITY


(n.) In the computer industry, the term security -- or the phrase computer security -- refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals [..]
Source: webopedia.com

26

0 Thumbs up   0 Thumbs down

SECURITY


Feelings of basic safety, assurance, and independence from alarm. In psychology, is regarded to be engendered by such conditions as a comforting, approving support system of family and friends; progre [..]
Source: psychologydictionary.org

27

0 Thumbs up   0 Thumbs down

SECURITY


See Safety on campus
Source: deakin.edu.au (offline)

28

0 Thumbs up   0 Thumbs down

SECURITY


In computing, the technology developed to prevent unauthorized persons, particularly hackers and crackers, from gaining entry to protected systems and files, including data encryption, virus detection [..]
Source: abc-clio.com

29

0 Thumbs up   0 Thumbs down

SECURITY


A password, key, procedure, or other device which has the ability to limit change in selected parameters. The existence and enforcement of techniques which restrict access to data, and the conditions [..]
Source: aiche.org

30

0 Thumbs up   0 Thumbs down

SECURITY


is a blanket term referring to an instrument (usually just recorded as a piece of paper) that represents financial value, such as stock, bonds, debt securities, funds, options, futures contracts and o [..]
Source: financialdictionary.net

31

0 Thumbs up   0 Thumbs down

SECURITY


pl: -ties 1 a : something (as a mortgage or collateral) that is provided to make certain the fulfillment of an obligation [used his property as for a loan] b : surety see also security for costs 2 ...
Source: dictionary.findlaw.com

32

0 Thumbs up   0 Thumbs down

SECURITY


Something given or deposited as surety for the payment of debt. In the case of home loans, the property which is to be bought with the loan money usually acts as the security.
Source: anz.com

33

0 Thumbs up   0 Thumbs down

SECURITY


Any kind of transferable certificate of ownership including EQUITY SECURITIES and DEBT SECURITIES.
Source: nysscpa.org

34

0 Thumbs up   0 Thumbs down

SECURITY


A pledge made to secure the performance of a contract or the fulfillment of an obligation. Examples of securities include real estate, equipment stocks or a co-signer. Mortgages are a form of security [..]
Source: gdrc.org

35

0 Thumbs up   0 Thumbs down

SECURITY


a share, participation, or other interest in property or in an enterprise of the issuer or an obligation of the issuer.
Source: naic.org

36

0 Thumbs up   0 Thumbs down

SECURITY


A transferable certificate of ownership of an investment product such as a note, bond, stock, futures contract or option. A security can also be defined as “property, which is pledged as collateral for a loan or other credit, and subject to seizure in the event of default.”
Source: fcac-acfc.gc.ca (offline)

37

0 Thumbs up   0 Thumbs down

SECURITY


Specific revenue sources or assets pledged by an issuer to the bondholder to secure repayment of the bond.
Source: investinginbonds.com (offline)

38

0 Thumbs up   0 Thumbs down

SECURITY


In association with computers, communication systems and automation, the term security is understood to mean any measures used to protect a system from attacks, whether accidental or intentional. The motivation for these attacks may vary, but includes espionage for example, or specific functional impairment through malware such as viruses, worms an [..]
Source: safety-network.org (offline)

39

0 Thumbs up   0 Thumbs down

SECURITY


Services which protect data, ensuring its confidentiality, availability and integrity.
Source: opengroup.org

40

0 Thumbs up   0 Thumbs down

SECURITY


Real estate or personal property used as collateral to back up a loan, which gives the lender tangible property that may be sold upon default to pay off the indebtedness.
Source: nonprofitfinancefund.org (offline)

41

0 Thumbs up   0 Thumbs down

SECURITY


A pledge made to secure the performance of a contract or the fulfillment of an obligation. Examples of securities include real estate, equipment stocks or a co-signer. Mortgages are a form of security with strong legal standing, because they are publicly registered following a formal legal procedure. A mortgage gives the lender holding a mortgage s [..]
Source: islamic-banking.com (offline)

42

0 Thumbs up   0 Thumbs down

SECURITY


The NZECO may seek a security to ensure that, in the event of a buyer's default, it will be repaid or appropriately compensated. Forms of security include: a bank guarantee; a guarantee from a pa [..]
Source: nzeco.govt.nz

43

0 Thumbs up   0 Thumbs down

SECURITY


A legal right of access to value through mortgages, contracts, cash accounts, guarantees, insurances, pledges, or cashflow, including licenses, concessions, and other assets.  A negotiable certi [..]
Source: people.hbs.edu

44

0 Thumbs up   0 Thumbs down

SECURITY


The paper right to a (generally tradeable) asset. The term is frequently used as a loose label to refer to all shares, debentures, notes, bills, government and semi-government bonds etc, which are traded on the stock exchange.
Source: linkmarketservices.co.nz (offline)

45

0 Thumbs up   0 Thumbs down

SECURITY


An investment instrument, other than an insurance policy or fixed annuity, issued by a corporation, government, or other organization that offers evidence of debt or equity. The official definition, from the Securities Exchange Act of 1934, is, "Any note, stock, treasury stock, bond, debenture, certificate of interest or participation in any p [..]
Source: chornyak.com (offline)

46

0 Thumbs up   0 Thumbs down

SECURITY


The collateral taken by the lender to insure against default by the borrower, on the loan.
Source: financemutual.com.au (offline)

47

0 Thumbs up   0 Thumbs down

SECURITY


An asset that guarantees the lender their loan until the loan is repaid in full. Usually the property is offered to secure the loan.
Source: homestart.com.au

48

0 Thumbs up   0 Thumbs down

SECURITY


An asset which a borrower uses to secure funding from a lender. In the event that the borrower cannot repay their debt, this asset can be acquired by the lender.
Source: macquarie.com (offline)

49

0 Thumbs up   0 Thumbs down

SECURITY


A (financial) security is a fungible financial instrument.
Source: financial.math.ncsu.edu

50

0 Thumbs up   0 Thumbs down

SECURITY


An asset that guarantees the lender their loan until the loan is repaid in full. Usually the property is offered to secure the loan.
Source: futurefinancial.com.au (offline)

51

0 Thumbs up   0 Thumbs down

SECURITY


Charge, Mortgage, Lien or Pledge.
Source: dlapipertradefinance.com (offline)

52

0 Thumbs up   0 Thumbs down

SECURITY


In relation to financial assets, a security is an investment such as shares or bonds which can be traded in financial markets.
Source: lifespanfp.com.au

53

0 Thumbs up   0 Thumbs down

SECURITY


A financial instrument.
Source: bankia.com (offline)

54

0 Thumbs up   0 Thumbs down

SECURITY


You can offer something you own as security or collateral on a loan, making it a secured loan. This could be property or stocks and shares, or something else of value. The lender ‘holds’ this to protect their investment when they lend you money. In return, the debtor often gets a lower interest rate, but people can risk losing their home if they ca [..]
Source: freedombusinessfinance.co.uk (offline)

55

0 Thumbs up   0 Thumbs down

SECURITY


A certificate issued by a corporation or government that has a value. Stocks and bonds are the most common securities.
Source: edition.cnn.com

56

0 Thumbs up   0 Thumbs down

SECURITY


Property - the vehicle in the case of car finance - that a financier can claim in case a borrower defaults on their loan obligation.
Source: strattonfinance.com.au

57

0 Thumbs up   0 Thumbs down

SECURITY


legal term for stock or shares
Source: going-global.com

58

0 Thumbs up   0 Thumbs down

SECURITY


An investment that is represented by a negotiable document issued by a corporation or governmental entity for the purpose of raising capital. A listed security is one that is approved for trading on a [..]
Source: zacks.com

59

0 Thumbs up   0 Thumbs down

SECURITY


Property which is designed and used as collateral.
Source: mortgageloan.com

60

0 Thumbs up   0 Thumbs down

SECURITY


The term security--
Source: definitions.uslegal.com

61

0 Thumbs up   0 Thumbs down

SECURITY


According to 122 CFR 12.2 [Title 12 -- Banks and Banking; Chapter I -- Comptroller of the Currency, Department of the Treasury; Part 12 -- Recordkeeping and Confirmation Requirements for Securities Tr [..]
Source: definitions.uslegal.com

62

0 Thumbs up   0 Thumbs down

SECURITY


menu Relative Danger Books Java Security Learning More Digital Signing And Encryption Schemes Links Security Holes Relative Danger The most dangerous things are at the top: Opening a file attached to [..]
Source: mindprod.com

63

0 Thumbs up   0 Thumbs down

SECURITY


New stuff that can make your computer and all your data even safer, and for dealing with new nasties online.
Source: budd-e.cybersmart.gov.au (offline)

64

0 Thumbs up   0 Thumbs down

SECURITY


In the context of patron training, refers to tools and practices used to prevent unauthorized access of personal data by third parties.
Source: libraryedge.org (offline)

65

0 Thumbs up   0 Thumbs down

SECURITY


Definitions of system access for end users. Security can be physical (equipment-related), module-related or data-related.
Source: uh.edu

66

0 Thumbs up   0 Thumbs down

SECURITY


property which is pledged as collateral for a loan, which can be taken back by the lender if the borrower defaults on the loan
Source: nomoredebts.org

67

0 Thumbs up   0 Thumbs down

SECURITY


is a financial instrument that represents debt, such as a bond, or represents ownership in an entity, (i.e. a stock). A security can be assigned value and traded in financial markets.
Source: treasury.gov

68

0 Thumbs up   0 Thumbs down

SECURITY


(also known as Collateral) is property or assets that a lender can take possession of, in the event that a loan cannot be repaid.
Source: empoweredfinance.com.au

69

0 Thumbs up   0 Thumbs down

SECURITY


(n) the state of being free from danger or injury(n) defense against financial failure; financial independence(n) freedom from anxiety or fear(n) a formal declaration that documents a fact of relevanc [..]
Source: beedictionary.com

70

0 Thumbs up   0 Thumbs down

SECURITY


Ensuring that private information remains private in an atmosphere where all other information is free. Security also means that viruses are prevented from infecting people's systems.
Source: netdictionary.com (offline)

71

0 Thumbs up   0 Thumbs down

SECURITY


Evidence of an investment, either in direct ownership (as with stocks), creditorship (as with bonds), or indirect ownership (as with options).
Source: ovig.us

72

0 Thumbs up   0 Thumbs down

SECURITY


cautela, obses
Source: latin-dictionary.org (offline)

73

0 Thumbs up   0 Thumbs down

SECURITY


Enhanced Linux - Security-Enhanced Linux (SELinux) is a version of the Linux kernel and utilities, which contains support for mandatory access controls based on the principle of least privilege. It is [..]
Source: labautopedia.org

74

0 Thumbs up   0 Thumbs down

SECURITY


The protection of the Nation and its people, vital interests, and way of life. (NPG, PPD-8)
Source: training.fema.gov

75

0 Thumbs up   0 Thumbs down

SECURITY


All campuses have a 24 hour security office.
Source: westernsydney.edu.au

76

0 Thumbs up   0 Thumbs down

SECURITY


A condition safe from unwanted intrusion
Source: ita-aites.org (offline)

77

0 Thumbs up   0 Thumbs down

SECURITY


The property used as collateral for a loan.
Source: nauticalwavesrealty.com

78

0 Thumbs up   0 Thumbs down

SECURITY


Collateral for a debt. For example, accounts receivable may be pledged as security for a loan. Security is a generic term used to refer to a bond, share certificate or other medium or long-term invest [..]
Source: fountaincpa.com

79

0 Thumbs up   0 Thumbs down

SECURITY


CONTAINER SECURITY GUARD / ESCORT
Source: hamburgsud-line.com (offline)

80

0 Thumbs up   0 Thumbs down

SECURITY


Security means safety, as well as the measures taken to be safe or protected.
Source: parcar.co.uk (offline)

81

0 Thumbs up   0 Thumbs down

SECURITY


The condition achieved when designated information, material, personnel, activities and installations are protected against espionage, sabotage, subversion and terrorism, as well as against loss or unauthorised disclosure. The term is also applied to those measures necessary to achieve this condition and to the organisations responsible for those m [..]
Source: protectivesecurity.govt.nz (offline)

82

0 Thumbs up   0 Thumbs down

SECURITY


Evidence of an investment, either in direct ownership (as with stocks), creditorship (as with bonds), or indirect ownership (as with options).
Source: securityfirst.net

83

0 Thumbs up   0 Thumbs down

SECURITY


An exchangable asset of value, including stocks, bonds, and other financial instruments.
Source: zionsdirect.com (offline)

84

0 Thumbs up   0 Thumbs down

SECURITY


A legal right of access to value through mortgages, contracts, cash accounts, guarantees, insurances, pledges or cash flow, including licences, concessions and other assets. Lenders can act on securit [..]
Source: pppknowledgelab.org

85

0 Thumbs up   0 Thumbs down

SECURITY


Collateral pledged by a bond issuer (debtor) to an investor (lender) to secure repayment of the loan.
Source: sifma.org

86

0 Thumbs up   0 Thumbs down

SECURITY


Property pledged to the creditor in case of a default on a loan; see collateral.
Source: tools.automotive.com (offline)

87

0 Thumbs up   0 Thumbs down

SECURITY


Assets or personal property used as collateral to secure a loan.
Source: wellsfargodealerservices.com

88

0 Thumbs up   0 Thumbs down

SECURITY


In relation to financial assets, a security is an investment such as shares or bonds which can be traded in financial markets.
Source: moneysmart.gov.au

89

0 Thumbs up   0 Thumbs down

SECURITY


means an asset e.g. a car or property, used to secure the loan which can be accessed by the credit provider to repay arrears if you do not meet your obligations.
Source: doingittough.info (offline)

90

0 Thumbs up   0 Thumbs down

SECURITY


Security is an important aspect of wireless networking. Wireless devices normally support multiple security standards previously, the most common standard was WEP (Wired Equivalent Privacy). Recently, [..]
Source: aver.com

91

0 Thumbs up   0 Thumbs down

SECURITY


Protective measures against unauthorized access to or interference with computer operating systems, Telecommunications, or data structures, especially the modification, deletion, destruction, or relea [..]
Source: online-medical-dictionary.org

92

0 Thumbs up   0 Thumbs down

SECURITY


Access by all in a community at all times to enough nutritious Food for an active, healthy Life. (from http://www.fns.USDA.gov/fsec/ accessed 4/22/2011)
Source: online-medical-dictionary.org

93

0 Thumbs up   0 Thumbs down

SECURITY


Financial assistance for the impoverished Elderly through public funding of Programs, services, and individual Income supplements.
Source: online-medical-dictionary.org

94

0 Thumbs up   0 Thumbs down

SECURITY


Government sponsored social Insurance Programs.
Source: online-medical-dictionary.org

95

0 Thumbs up   0 Thumbs down

SECURITY


That which ensures to the satisfaction of the Customs that an obligation to the Customs will be fulfilled. Security is described as "general" when it ensures that the obligations ari [..]
Source: sars.gov.za

96

0 Thumbs up   0 Thumbs down

SECURITY


A financial instrument such as stock, bond or treasury bill.
Source: cooperators.ca

97

0 Thumbs up   0 Thumbs down

SECURITY


The Underwriters subscribing a risk. The Insurers.
Source: hollisinsurance.com

98

0 Thumbs up   0 Thumbs down

SECURITY


The underwriters subscribing a risk.
Source: aisinsurance.com.au

99

0 Thumbs up   0 Thumbs down

SECURITY


Property offered as backing for a loan. In the case of mortgages, the property being purchased with the loan usually forms the security for the loan.
Source: fiscalagents.com

100

0 Thumbs up   0 Thumbs down

SECURITY


The value of the cash, investments or assets you provide to secure your loan.
Source: stgeorge.com.au

101

0 Thumbs up   0 Thumbs down

SECURITY


In the case of mortgages, real estate offered as collateral for the loan.
Source: tdcanadatrust.com (offline)

102

0 Thumbs up   0 Thumbs down

SECURITY


The protection that’s placed on a file. Security includes various types of accounts to authenticate users, levels of privilege sets to determine what can be done with a file, and authorization of othe [..]
Source: filemaker.com

103

0 Thumbs up   0 Thumbs down

SECURITY


Belief in the safety of one's person and position. Security is a driving factor in employee reporting.
Source: ethics.org (offline)

104

0 Thumbs up   0 Thumbs down

SECURITY


A general term for a tradable financial instrument.
Source: investecassetmanagement.com (offline)

105

0 Thumbs up   0 Thumbs down

SECURITY


General term for an equity or debt instrument issued by a government or company.
Source: schroders.com

106

0 Thumbs up   0 Thumbs down

SECURITY


(1) an asset traded on a financial market, such as shares or bonds or (2) an asset pledged to ensure the repayment of a loan
Source: bt.com.au

107

0 Thumbs up   0 Thumbs down

SECURITY


General term for an equity or debt instrument issued by a government or company.
Source: schroders.co.uk (offline)

108

0 Thumbs up   0 Thumbs down

SECURITY


An investment instrument, other than an insurance policy or fixed annuity, issued by a corporation, government, or other organization that offers evidence of debt or equity. The official definition, f [..]
Source: caplanmgmt.com

109

0 Thumbs up   0 Thumbs down

SECURITY


a financial instrument which includes the assumption of debt, (bonds, bills), shares, derivatives (swaps, options, futures). Share Price
Source: scala.trade (offline)

110

0 Thumbs up   0 Thumbs down

SECURITY


A condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems. Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that s [..]
Source: ise.gov (offline)

111

0 Thumbs up   0 Thumbs down

SECURITY


Techniques and practices that preserve the integrity of computer systems, and digital library services and collections.
Source: cs.cornell.edu (offline)

112

0 Thumbs up   0 Thumbs down

SECURITY


Essentially, a contract that can be assigned a value and traded. It could be a stock, bond or mortgage debt, for example.
Source: faireconomy.org

113

0 Thumbs up   0 Thumbs down

SECURITY


A general term that applies to most investment types, including stocks, options, bonds, etc.
Source: ubs.com

114

0 Thumbs up   0 Thumbs down

SECURITY


measures taken on entry to the airside area to prevent illegal acts against civil aviation.
Source: riga-airport.com

115

0 Thumbs up   0 Thumbs down

SECURITY


Measures taken on entry to the airside area to prevent illegal acts against civil aviation.
Source: cph.dk (offline)

116

0 Thumbs up   0 Thumbs down

SECURITY


Any kind of transferable certificate of ownership including equity securities and debt securities.
Source: startheregoplaces.com

117

0 Thumbs up   0 Thumbs down

SECURITY


Measures taken to keep something secure.
Source: bankingglossary.bankingonly.com (offline)

118

0 Thumbs up   0 Thumbs down

SECURITY


The value of the cash, investments or assets you provide to secure your loan.
Source: banksa.com.au

119

0 Thumbs up   0 Thumbs down

SECURITY


Real or personal property that guarantees the repayment of a loan. The borrower risks losing the property if the loan is not repaid.
Source: bankinginfo.com.my (offline)

120

0 Thumbs up   0 Thumbs down

SECURITY


Documents representing the right of the bearer to capital or credit. These instruments can be traded and their transfer or endorsement accredits ownership of them or implied rights.
Source: banxico.org.mx

121

0 Thumbs up   0 Thumbs down

SECURITY


Security refers to a general environment of law and order; freedom from physical threats.
Source: sphereproject.org (offline)

122

0 Thumbs up   0 Thumbs down

SECURITY


QoS
Source: zytrax.com (offline)

123

0 Thumbs up   0 Thumbs down

SECURITY


 
Source: zytrax.com (offline)

124

0 Thumbs up   0 Thumbs down

SECURITY


, Techniques for ensuring that data stored in a computer cannot be read or compromised. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism.
Source: covalentworks.com (offline)

125

0 Thumbs up   0 Thumbs down

SECURITY


Measures taken to keep something protected or safe from viewing, destruction, or manipulation.
Source: ecommerce.wsu.edu

126

0 Thumbs up   0 Thumbs down

SECURITY


Processes, practices, and software that secure health information from unauthorized access, ensuring that the information is not altered and that it is accessible when needed by those authorized.
Source: iowaehealth.org (offline)

127

0 Thumbs up   0 Thumbs down

SECURITY


Security is where passengers have their possessions checked before they get on their flight. We have to take our shoes off when we go through security.
Source: businessenglishresources.com

128

0 Thumbs up   0 Thumbs down

SECURITY


Security related products include serial controlled video cameras, remote controlled camera housings, video recorders, Digital Time Lapse Recorders, VCRs, badge readers, access control, security gate controls and related products.
Source: bb-elec.com (offline)

129

0 Thumbs up   0 Thumbs down

SECURITY


 an asset that accrues income. It is usually in the form of a contract detailing a debt or equity issued by a corporation, government or other organisation. Classic examples of securities would be government bonds or corporate shares. 
Source: fern.org (offline)

130

0 Thumbs up   0 Thumbs down

SECURITY


File that stores one or more server certificates or root certificates from trusted Certification Authorities.
Source: help.sap.com

131

0 Thumbs up   0 Thumbs down

SECURITY


A scheme for adding enough random material to a message so that the message can be encrypted or signed with a primitive. The scheme is defined in RSAES-PKCS 1.5.
Source: help.sap.com

132

0 Thumbs up   0 Thumbs down

SECURITY


Personal Security Environment (PSE) for the SAP System.
Source: help.sap.com

133

0 Thumbs up   0 Thumbs down

SECURITY


To be able to use the security functions provided by SSL and SNC, you must establish trust between the components involved in the communications. Although the basic concepts used here are similar, the [..]
Source: help.sap.com

134

0 Thumbs up   0 Thumbs down

SECURITY


A data encryption standard comprised of a three-step data encryption algorithm that evolved from DES, providing greater security because it encrypts, decrypts, and encrypts the data using three keys i [..]
Source: help.sap.com

135

0 Thumbs up   0 Thumbs down

SECURITY


In J2EE Engine IpVerification Manager is used for IP access control - it checks whether a particular IP address has an access permission.
Source: help.sap.com

136

0 Thumbs up   0 Thumbs down

SECURITY


A list that specifies which users or system components are allowed to access a resource.
Source: help.sap.com

137

0 Thumbs up   0 Thumbs down

SECURITY


Credentials used to access protected resources. An access token is a string representing an authorization issued to the OAuth 2.0 client. Tokens represent specific OAuth 2.0 scopes and durations of ac [..]
Source: help.sap.com

138

0 Thumbs up   0 Thumbs down

SECURITY


Collection of permissions used to enforce authorizations in SAP User Management Engine.
Source: help.sap.com

139

0 Thumbs up   0 Thumbs down

SECURITY


Deliberate attempt to evade system security and alter the system.
Source: help.sap.com

140

0 Thumbs up   0 Thumbs down

SECURITY


A storage location for other users' public-key certificates so that their digital signatures can be verified.
Source: help.sap.com

141

0 Thumbs up   0 Thumbs down

SECURITY


A symmetric cryptographic algorithm that has been adopted by the U.S. government as a replacement for the Data Encryption Standard (DES) algorithm for encrypting sensitive, unclassified data.
Source: help.sap.com

142

0 Thumbs up   0 Thumbs down

SECURITY


In SAML 2.0 it is a logical grouping of service providers under a single name. In this grouping, a user authenticated at the identity provider for one service provider can be automatically federated w [..]
Source: help.sap.com

143

0 Thumbs up   0 Thumbs down

SECURITY


Version of the CRL distribution point that may be used if the primary distribution point is not accessible. For example, you can download the certificate revocation list (CRL) to an alternative local [..]
Source: help.sap.com

144

0 Thumbs up   0 Thumbs down

SECURITY


Form of logon where users do not have to provide any form of authentication such as user ID and password, client certificate, and so on.
Source: help.sap.com

145

0 Thumbs up   0 Thumbs down

SECURITY


The endpoint of a SAML service provider or identity provider that processes the artifact resolution requests from the assertion consumer service of other providers. This communication takes place dire [..]
Source: help.sap.com

146

0 Thumbs up   0 Thumbs down

SECURITY


The endpoint of a SAML service provider or identity provider that validates and interprets the SAML response or artifact presented by the client (user), requests the resolution of any artifacts, and c [..]
Source: help.sap.com

147

0 Thumbs up   0 Thumbs down

SECURITY


Targeted attempt to evade system security to alter the system or to confiscate information.
Source: help.sap.com

148

0 Thumbs up   0 Thumbs down

SECURITY


An element of a Security Assertion Markup Language (SAML) 2.0 assertion that indicates that the SAML asserting party makes no claims about the accuracy or trustworthiness of assertions received by par [..]
Source: help.sap.com

149

0 Thumbs up   0 Thumbs down

SECURITY


The tracking of events as they occur in the system so that a series of events can be reconstructed at a later date.
Source: help.sap.com

150

0 Thumbs up   0 Thumbs down

SECURITY


A group of events recorded by the Security Audit Log.
Source: help.sap.com

151

0 Thumbs up   0 Thumbs down

SECURITY


A file containing audit information from the Security Audit Log.
Source: help.sap.com

152

0 Thumbs up   0 Thumbs down

SECURITY


A security-relevant chronological record or set of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, event or reso [..]
Source: help.sap.com

153

0 Thumbs up   0 Thumbs down

SECURITY


The audit information saved to the audit log.
Source: help.sap.com

154

0 Thumbs up   0 Thumbs down

SECURITY


Special type of logon ticket with a very limited time period of validity. It is used for authentication for communication between the J2EE Engine and SAP NetWeaver Application Server (ABAP), for the s [..]
Source: help.sap.com

155

0 Thumbs up   0 Thumbs down

SECURITY


The sum of information concerning how an authenticating authority identified a principal, including how this information is protected. In SAML a relying party can request the authentication context in [..]
Source: help.sap.com

156

0 Thumbs up   0 Thumbs down

SECURITY


Method used to authenticate a user or component. Examples supported by SAP systems include:
Source: help.sap.com

157

0 Thumbs up   0 Thumbs down

SECURITY


In SAML 2.0 the authentication policy is set by the service provider and determines if a user must reauthenticate at the identity provider or if the identity provider must authenticate the user withou [..]
Source: help.sap.com

158

0 Thumbs up   0 Thumbs down

SECURITY


Definition on the J2EE Engine of what is required for authentication. This includes:
Source: help.sap.com

159

0 Thumbs up   0 Thumbs down

SECURITY


Login module stack that serves as a template for other components. Any changes made to the original login module stack affect all other components that reference it as a template.
Source: help.sap.com

160

0 Thumbs up   0 Thumbs down

SECURITY


Role in the SAP system derived from a portal role. The menu structure and user assignment of the authorization role are assigned by the portal role.
Source: help.sap.com

161

0 Thumbs up   0 Thumbs down

SECURITY


Server issuing access tokens to the OAuth 2.0 client after having successfully authenticated a resource owner and obtained authorization.
Source: help.sap.com

162

0 Thumbs up   0 Thumbs down

SECURITY


A method of submitting HTML forms with HTTP POST automatically. This is usually done with Javascript.
Source: help.sap.com

163

0 Thumbs up   0 Thumbs down

SECURITY


A communication channel that avoids the standard communication channel. For SAML 2.0 the back channel is directly between the identity provider and the service provider. Communication does not go over [..]
Source: help.sap.com

164

0 Thumbs up   0 Thumbs down

SECURITY


A security hole in the software or a program that enables an attacker to gain (remote) access to a system or its data. The security hole can be planned or accidental. In both cases, the security hole [..]
Source: help.sap.com

165

0 Thumbs up   0 Thumbs down

SECURITY


The location on the directory server where the directory access service entries.
Source: help.sap.com

166

0 Thumbs up   0 Thumbs down

SECURITY


The simplest form of authentication supported by most Web browsers and Web servers. With this authentication mechanism the client sends the user ID and password to the server in plain text.
Source: help.sap.com

167

0 Thumbs up   0 Thumbs down

SECURITY


Authentication mechanism to be used in case the first authentication mechanism you configured for Single Sign-On, for example, authentication with logon tickets fails. The user is then authenticated u [..]
Source: help.sap.com

168

0 Thumbs up   0 Thumbs down

SECURITY


An attack that requires trying all (or a large fraction of all) possible values until the right value is found.
Source: help.sap.com

169

0 Thumbs up   0 Thumbs down

SECURITY


A person who uses software for the purpose of furthering a business process, and not for the purposes of carrying out an administrative or developer task such as a purchaser, a sales representative, o [..]
Source: help.sap.com

170

0 Thumbs up   0 Thumbs down

SECURITY


An identifier for a user when using Secure Network Communications after the name is converted to a standard format.
Source: help.sap.com

171

0 Thumbs up   0 Thumbs down

SECURITY


A list that contains the public-key certificates belonging to other users or system components that are trusted.
Source: help.sap.com

172

0 Thumbs up   0 Thumbs down

SECURITY


Logon to an SAP system using digital certificates. The actual authentication takes place using public-key technology, for example, using the Secure Sockets Layer (SSL) protocol.
Source: help.sap.com

173

0 Thumbs up   0 Thumbs down

SECURITY


The act of creating a correspondance between users in a system and X.509 certificates for the purpose of enabling Single Sign-On (SSO).
Source: help.sap.com

174

0 Thumbs up   0 Thumbs down

SECURITY


A request for a Certification Authority (CA) to issue a public-key certificate to a user or component.
Source: help.sap.com

175

0 Thumbs up   0 Thumbs down

SECURITY


The digitally-signed public-key certificate returned to the person or entity requesting a certificate from a Certification Authority (CA). This digitally-signed certificate corresponds exactly to the [..]
Source: help.sap.com

176

0 Thumbs up   0 Thumbs down

SECURITY


Service on the AS Java that checks certificate revocation lists to make sure that a given certificate has not been revoked by the issuing Certification Authority (CA).
Source: help.sap.com

177

0 Thumbs up   0 Thumbs down

SECURITY


A group of certificates that have been declared to be invalid.
Source: help.sap.com

178

0 Thumbs up   0 Thumbs down

SECURITY


An external instance that issues public-key certificates.
Source: help.sap.com

179

0 Thumbs up   0 Thumbs down

SECURITY


A digital document that is used to identify a user or system component.
Source: help.sap.com

180

0 Thumbs up   0 Thumbs down

SECURITY


A specific HTTP header.
Source: help.sap.com

181

0 Thumbs up   0 Thumbs down

SECURITY


The act of inserting (malicious) code into a program or Web site. This enables the attacker, who inserts the code, to change the behavior of the program or Web site.
Source: help.sap.com

182

0 Thumbs up   0 Thumbs down

SECURITY


In Security Assertion Markup Language (SAML) 2.0, the host domain of an identity provider discovery service and its common domain cookie.
Source: help.sap.com

183

0 Thumbs up   0 Thumbs down

SECURITY


In SAML 2.0 the common domain cookie (CDC) is a cookie that enables an identity provider to identify itself to a service provider. When a service provider cannot initially identify the identity provid [..]
Source: help.sap.com

184

0 Thumbs up   0 Thumbs down

SECURITY


Attribute in a user's profile. Every user belongs to one company only.
Source: help.sap.com

185

0 Thumbs up   0 Thumbs down

SECURITY


An interface implemented by application frameworks called by the OAuth authentication module to derive the corresponding ABAP development object from HTTP requests to URIs.
Source: help.sap.com

186

0 Thumbs up   0 Thumbs down

SECURITY


Main CRL distribution point for a Certification Authority (CA). This location is included in the certificates issued by the CA as the CRL distribution point.
Source: help.sap.com

187

0 Thumbs up   0 Thumbs down

SECURITY


Object in SAP User Management Engine, for example, user, user account, group, or role.
Source: help.sap.com

188

0 Thumbs up   0 Thumbs down

SECURITY


Location in the public-key infrastructure where the users' and components' public keys are stored.
Source: help.sap.com

189

0 Thumbs up   0 Thumbs down

SECURITY


Private part of the public and private key pair used for encryption or for digital signatures.
Source: help.sap.com

190

0 Thumbs up   0 Thumbs down

SECURITY


Contains user data such as e-mail address, language, password. Can be changed by an administrator or the user.
Source: help.sap.com

191

0 Thumbs up   0 Thumbs down

SECURITY


Authentication concept that requires a component to explicitly trigger authentication itself. The authentication process is subsequently controlled by the authentication framework of the container in [..]
Source: help.sap.com

192

0 Thumbs up   0 Thumbs down

SECURITY


Evidence that proves a party possesses a private key corresponding to a public key to another party in public-key infrastructure.
Source: help.sap.com

193

0 Thumbs up   0 Thumbs down

SECURITY


A user ID that does not include information about the real person that the ID represents.
Source: help.sap.com

194

0 Thumbs up   0 Thumbs down

SECURITY


The mapping of the messages or message patterns of one protocol onto another protocol. In SAML 2.0, for example, the mapping of a SAML authentication request message onto SOAP is a SAML SOAP binding.
Source: help.sap.com

195

0 Thumbs up   0 Thumbs down

SECURITY


Public part of the public-key pair used for encryption or for digital signatures.
Source: help.sap.com

196

0 Thumbs up   0 Thumbs down

SECURITY


Key pair that consists of the public and the private keys.
Source: help.sap.com

197

0 Thumbs up   0 Thumbs down

SECURITY


A digital document that acts as a user's digital identification card.
Source: help.sap.com

198

0 Thumbs up   0 Thumbs down

SECURITY


A series of documents produced and distributed by RSA Laboratories that define standards for using public-key technology.
Source: help.sap.com

199

0 Thumbs up   0 Thumbs down

SECURITY


An encryption method that uses two different, complementary keys for the encryption and decryption of information sent over computer networks.
Source: help.sap.com

200

0 Thumbs up   0 Thumbs down

SECURITY


System that manages the trust relationships involved with using public-key technology.
Source: help.sap.com

201

0 Thumbs up   0 Thumbs down

SECURITY


List that contains the public-key information (to include the public keys) belonging to other users or system components.
Source: help.sap.com

202

0 Thumbs up   0 Thumbs down

SECURITY


The technology used for securing digital documents.
Source: help.sap.com

203

0 Thumbs up   0 Thumbs down

SECURITY


An SAP NetWeaver component used to monitor and log read access to sensitive data.
Source: help.sap.com

204

0 Thumbs up   0 Thumbs down

SECURITY


An application making protected resource requests on behalf of the resource owner and with its authorization.
Source: help.sap.com

205

0 Thumbs up   0 Thumbs down

SECURITY


An OAuth 2.0 scope is determined in negociation between the resource owner and the user who wants to access the resource.
Source: help.sap.com

206

0 Thumbs up   0 Thumbs down

SECURITY


A Kerberos realm is the set of Kerberos principals that are registered within a Kerberos server. The Kerberos realm represents an administrative domain that has its own Kerberos database containing in [..]
Source: help.sap.com

207

0 Thumbs up   0 Thumbs down

SECURITY


The inability to deny having performed an action.
Source: help.sap.com

208

0 Thumbs up   0 Thumbs down

SECURITY


A type of cross-site scripting attack in which the Web application embeds content received from the HTTP request in its HTTP response. A successful exploitation occurs when the attacker tricks the vic [..]
Source: help.sap.com

209

0 Thumbs up   0 Thumbs down

SECURITY


A temporary token used to obtain access tokens. Refresh tokens are issued to the OAuth 2.0 client by the authorization server and used to obtain a new access token when the current access token become [..]
Source: help.sap.com

210

0 Thumbs up   0 Thumbs down

SECURITY


An entity in the public-key infrastructure (PKI) that verifies a certificate request and then passes it on to the Certification Authority (CA).
Source: help.sap.com

211

0 Thumbs up   0 Thumbs down

SECURITY


In SAML 2.0 the content of the RelayState parameter. The SAML service provider uses this parameter to find out the relative path of the application to which the service provider should redirect an inc [..]
Source: help.sap.com

212

0 Thumbs up   0 Thumbs down

SECURITY


A token used to refer to a principal in SAML messages.
Source: help.sap.com

213

0 Thumbs up   0 Thumbs down

SECURITY


Identifies the type of information the name identifier includes. The SAML standard defines the formats as follows:
Source: help.sap.com

214

0 Thumbs up   0 Thumbs down

SECURITY


User used for anonymous logon to Java applications such as SAP Enterprise Portal.
Source: help.sap.com

215

0 Thumbs up   0 Thumbs down

SECURITY


Service available on the mySAP.com Marketplace that issues mySAP.com users their mySAP.com Passports.
Source: help.sap.com

216

0 Thumbs up   0 Thumbs down

SECURITY


The practice of logging on multiple times to the same account from multiple clients.
Source: help.sap.com

217

0 Thumbs up   0 Thumbs down

SECURITY


An entity capable of granting access to a protected resource.
Source: help.sap.com

218

0 Thumbs up   0 Thumbs down

SECURITY


Hosts the protected resource and is capable of accepting and responding to protected resource requests using access tokens.
Source: help.sap.com

219

0 Thumbs up   0 Thumbs down

SECURITY


The URI to use for Security Assertion Markup Language (SAML) resonse messages.
Source: help.sap.com

220

0 Thumbs up   0 Thumbs down

SECURITY


In SAML 2.0 a temporary identifier for a principal that does not reveal private information about the principal.
Source: help.sap.com

221

0 Thumbs up   0 Thumbs down

SECURITY


A basic protocol used by other protocols to communicate through the network.
Source: help.sap.com

222

0 Thumbs up   0 Thumbs down

SECURITY


A proposed Internet standard protocol that is an enhancement of the Secure Sockets Layer (SSL) Version 3.0 protocol.
Source: help.sap.com

223

0 Thumbs up   0 Thumbs down

SECURITY


A mechanism used by web browsers to determine the content type of a file. The browser parses the first byte of the binary content stream to determine the MIME type of the file.
Source: help.sap.com

224

0 Thumbs up   0 Thumbs down

SECURITY


Certificate belonging to a Certification Authority (CA).
Source: help.sap.com

225

0 Thumbs up   0 Thumbs down

SECURITY


The highest Certification Authority in a PKI. All users of the PKI must trust it. Its certificate is signed with a private key. There can be any amount of CAs between a user certificate and the root C [..]
Source: help.sap.com

226

0 Thumbs up   0 Thumbs down

SECURITY


Windows NT authentication protocol that uses a challenge and response algorithm for authenticating users within a Windows NT network.
Source: help.sap.com

227

0 Thumbs up   0 Thumbs down

SECURITY


Microsoft's security provider that uses the the Microsoft Windows NT LAN Manager (NTLM) protocol to authenticate users in a Windows NT network.
Source: help.sap.com

228

0 Thumbs up   0 Thumbs down

SECURITY


A public-key cryptographic algorithm which can be used both for encrypting messages and creating digital signatures.
Source: help.sap.com

229

0 Thumbs up   0 Thumbs down

SECURITY


Identity with which an EJB is executed. This identity is usually not the identity of the caller.
Source: help.sap.com

230

0 Thumbs up   0 Thumbs down

SECURITY


The representation of a text in the form of a single string of digits, created using a one-way hash function.
Source: help.sap.com

231

0 Thumbs up   0 Thumbs down

SECURITY


A message type of the single logout protocol of the SAML 2.0 standard. A provider sends a logout request to initiate a Single Log-Out by an identity provider. An identity provider sends a logout reque [..]
Source: help.sap.com

232

0 Thumbs up   0 Thumbs down

SECURITY


A message type of the single logout protocol of the SAML 2.0 standard. A provider sends a logout response to a provider to confirm that it has terminated any sessions with the principal specified in t [..]
Source: help.sap.com

233

0 Thumbs up   0 Thumbs down

SECURITY


A message type of the Authentication Request protocol of the Security Assertion Markup Language (SAML). A response message returns SAML assertions to the requesting service provider.
Source: help.sap.com

234

0 Thumbs up   0 Thumbs down

SECURITY


A system entity providing a set of web applications with a common session management, identity management, and trust management
Source: help.sap.com

235

0 Thumbs up   0 Thumbs down

SECURITY


SAML token profiles are used for WS access authentication at the SOAP message level.
Source: help.sap.com

236

0 Thumbs up   0 Thumbs down

SECURITY


A message type of the Artifact Resolution protocol of the Security Assertion Markup Language (SAML). A SAML provider uses an artifact resolution request to retrieve a SAML message referred to by an ar [..]
Source: help.sap.com

237

0 Thumbs up   0 Thumbs down

SECURITY


A message type of the Artifact Resolution profile of the Security Assertion Markup Language (SAML). An artifact response includes a SAML message requested by another provider.
Source: help.sap.com

238

0 Thumbs up   0 Thumbs down

SECURITY


A collection of statements (though zero statements is possible) made by a SAML authority about a specific principals. According to the SAML standard, these statements can of the following types:
Source: help.sap.com

239

0 Thumbs up   0 Thumbs down

SECURITY


A message type of the Authentication Request protocol of the Security Assertion Markup Language (SAML). A SAML service provider uses an authentication request to get information about a principal or a [..]
Source: help.sap.com

240

0 Thumbs up   0 Thumbs down

SECURITY


SAML browser artifacts are used as a reference to a SAML protocol message stored on a source site (in SAML 1.x) or a provider (in SAML 2.0). The artifacts are designed to be transferred in a URL. The [..]
Source: help.sap.com

241

0 Thumbs up   0 Thumbs down

SECURITY


An entity that manages identity information for principals and provides authentication services to other trusted service providers.
Source: help.sap.com

242

0 Thumbs up   0 Thumbs down

SECURITY


The sender of SAML assertions with which a user can logon to a system trusting the issuer.
Source: help.sap.com

243

0 Thumbs up   0 Thumbs down

SECURITY


The Certification Authority (CA) provided by the SAP AG that issues certificates to SAP customers.
Source: help.sap.com

244

0 Thumbs up   0 Thumbs down

SECURITY


X.509 client certificate issued to SAP customers' end users by the SAP Certification Authority (CA).
Source: help.sap.com

245

0 Thumbs up   0 Thumbs down

SECURITY


Default security provider provided with the SAP System.
Source: help.sap.com

246

0 Thumbs up   0 Thumbs down

SECURITY


Service provided by SAP from which SAP customers can receive public-key certificates issued by the SAP Certification Authority (CA).
Source: help.sap.com

247

0 Thumbs up   0 Thumbs down

SECURITY


A collection of multiple identical virus scanners used for better workload distribution.
Source: help.sap.com

248

0 Thumbs up   0 Thumbs down

SECURITY


Key used for encrypting and decrypting messages using symmetric encryption algorithms.
Source: help.sap.com

249

0 Thumbs up   0 Thumbs down

SECURITY


An open industry standard protocol developed for the secure transmission of payment information over the Internet and other electronic networks.
Source: help.sap.com

250

0 Thumbs up   0 Thumbs down

SECURITY


Internet-standard that defines a means to make email messages more secure by adding both digital signatures and encryption.
Source: help.sap.com

251

0 Thumbs up   0 Thumbs down

SECURITY


Interface that allows secured communication connections between SAP System components. Strong authentication, integrity protection, and privacy protection may be provided.
Source: help.sap.com

252

0 Thumbs up   0 Thumbs down

SECURITY


An Internet standard protocol developed by Netscape that is used to secure communications across the Internet.
Source: help.sap.com

253

0 Thumbs up   0 Thumbs down

SECURITY


Secure storage location in which the SAP System to store critical information such as passwords. The data stored in the system's secure storage is encrypted.
Source: help.sap.com

254

0 Thumbs up   0 Thumbs down

SECURITY


BAdI implementation to provide application-specific data for managing the secure storage.
Source: help.sap.com

255

0 Thumbs up   0 Thumbs down

SECURITY


An interface that allows the SAP system to protect data and documents using digital signatures and encryption.
Source: help.sap.com

256

0 Thumbs up   0 Thumbs down

SECURITY


A tool that produces a log containing security-related system events such as configuration changes or unsuccessful logon attempts.
Source: help.sap.com

257

0 Thumbs up   0 Thumbs down

SECURITY


A vulnerability in a computer program that enables a malicious user to gain unauthorized access to data, networks, systems, or functions.
Source: help.sap.com

258

0 Thumbs up   0 Thumbs down

SECURITY


SAP Notes that are used to inform customers about a solution or workaround for an existing security issue in shipped SAP software (see SAP Note 1139963). They contain advice including countermeasures [..]
Source: help.sap.com

259

0 Thumbs up   0 Thumbs down

SECURITY


The security constraints over the access to protected resource.
Source: help.sap.com

260

0 Thumbs up   0 Thumbs down

SECURITY


Subject confirmation method for system-to-system communication with which a system vouches for the identity of a user. The system forwards this information as part of the SAML assertion to another sys [..]
Source: help.sap.com

261

0 Thumbs up   0 Thumbs down

SECURITY


The name by which a client uniquely identifies an instance of a service.
Source: help.sap.com

262

0 Thumbs up   0 Thumbs down

SECURITY


An XML-based expression syntax for the query and exchange of user account information, for example, users, groups, or roles.
Source: help.sap.com

263

0 Thumbs up   0 Thumbs down

SECURITY


A type of attack where one user attempts to set the session ID of another user.
Source: help.sap.com

264

0 Thumbs up   0 Thumbs down

SECURITY


A standard pseudo-mechanism, used to determine which GSS API mechanisms are shared, select one and then establish a security context for communication using it.
Source: help.sap.com

265

0 Thumbs up   0 Thumbs down

SECURITY


A method used by the Lightweight Directory Access Protocol (LDAP) to authenticate users based on user ID and password.
Source: help.sap.com

266

0 Thumbs up   0 Thumbs down

SECURITY


The capability to terminate all sessions of a specific user or a user agent, such as Web browser, at the click of a single button.
Source: help.sap.com

267

0 Thumbs up   0 Thumbs down

SECURITY


A mechanism that eliminates the need for users to enter passwords for every system that they log on to.
Source: help.sap.com

268

0 Thumbs up   0 Thumbs down

SECURITY


An intranet domain that consists of a single level. In user@example, the domain has a single designation, "example." This is incontrast with user@example.com, where there is a top-level doma [..]
Source: help.sap.com

269

0 Thumbs up   0 Thumbs down

SECURITY


The server's Personal Security Environment (PSE) that contains the information needed to establish a connection using Secure Network Communication (SNC).
Source: help.sap.com

270

0 Thumbs up   0 Thumbs down

SECURITY


A log where the execution of SQL statements to certain tables are recorded.
Source: help.sap.com

271

0 Thumbs up   0 Thumbs down

SECURITY


Injection of malicious SQL statements by an attacker. an SQL Injection is possibe, if statements or parst of statements that imported from the outside into a program, are passed to the database system [..]
Source: help.sap.com

272

0 Thumbs up   0 Thumbs down

SECURITY


Performs a scanning for various threat types, such as viruses, spyware, malware etc.
Source: help.sap.com

273

0 Thumbs up   0 Thumbs down

SECURITY


Library available to non-SAP applications for authentication purposes and Single Sign-On.
Source: help.sap.com

274

0 Thumbs up   0 Thumbs down

SECURITY


A type of cross-site scripting attack in which the attacker stores the injected code or script on a vulnerable server. For example, the malicious code can be contained in a forum message. The maliciou [..]
Source: help.sap.com

275

0 Thumbs up   0 Thumbs down

SECURITY


The process of identifying a user (or component) by proving that the user has knowledge of a secret without the user having to reveal the secret.
Source: help.sap.com

276

0 Thumbs up   0 Thumbs down

SECURITY


X.509 certificate attribute that identifies the owner of the certificate.
Source: help.sap.com

277

0 Thumbs up   0 Thumbs down

SECURITY


In public key infrastructure, the subject alternative name (SAN) is an extension of X.509 certificate enabling the certificate issuer to associate additional identities with the subject of a certifica [..]
Source: help.sap.com

278

0 Thumbs up   0 Thumbs down

SECURITY


Method to confirm a subject with SAML token profile authentication.
Source: help.sap.com

279

0 Thumbs up   0 Thumbs down

SECURITY


Information used by the SAP system for Secure Store and Forward (SSF) mechanisms where a user or component's private part of the public-key information is stored (the private key).
Source: help.sap.com

280

0 Thumbs up   0 Thumbs down

SECURITY


The server's Personal Security Environment (PSE) that contains the information needed to establish a connection using the Secure Sockets Layer (SSL) protocol, where the server is the client compo [..]
Source: help.sap.com

281

0 Thumbs up   0 Thumbs down

SECURITY


Identity that the server uses for a specific SSL connection. The server can have multiple SSL server identities. Each SSL server identity possesses its own SSL server Personal Security Environment (PS [..]
Source: help.sap.com

282

0 Thumbs up   0 Thumbs down

SECURITY


The server's Personal Security Environment (PSE) that contains the information needed to establish a connection using the Secure Sockets Layer (SSL) protocol, where the server is the server compo [..]
Source: help.sap.com

283

0 Thumbs up   0 Thumbs down

SECURITY


The Personal Security Environment (PSE) used for Single Sign-On (SSO) in the mySAP Workplace when using logon tickets.
Source: help.sap.com

284

0 Thumbs up   0 Thumbs down

SECURITY


Java class defined by the Java Authentication and Authorization Service (JAAS) that defines the authentication logic for a particular authentication mechanism. For example, the Basic Authentication lo [..]
Source: help.sap.com

285

0 Thumbs up   0 Thumbs down

SECURITY


List of login modules containing authentication logic that is assigned to a component. When a user is authenticated on the J2EE Engine, the server sequentially processes the login module stack that ap [..]
Source: help.sap.com

286

0 Thumbs up   0 Thumbs down

SECURITY


The URI to use to contact the Single Sign-On endpoint of the provider to the Security Assertion Markup Language (SAML) 2.0 standard.
Source: help.sap.com

287

0 Thumbs up   0 Thumbs down

SECURITY


The name of the destination (as part of the destination service of the SAP NetWeaver Application Server) to use to contact the Single Sign-On endpoint of the provider according to the Security Asserti [..]
Source: help.sap.com

288

0 Thumbs up   0 Thumbs down

SECURITY


A program or script written to harm, compromise, or hinder a computer system, its applications, or its users.
Source: help.sap.com

289

0 Thumbs up   0 Thumbs down

SECURITY


An attack in which an attacker inserts itself between two parties and pretends to be one of the parties.
Source: help.sap.com

290

0 Thumbs up   0 Thumbs down

SECURITY


The act of enabling a user to link his or her user account on a remote system with his or her user account on the local system during logon.
Source: help.sap.com

291

0 Thumbs up   0 Thumbs down

SECURITY


Secure location where a user or component's public-key information is stored.
Source: help.sap.com

292

0 Thumbs up   0 Thumbs down

SECURITY


A secret known by a user used to confirm his or her identity, such as a numeric password.
Source: help.sap.com

293

0 Thumbs up   0 Thumbs down

SECURITY


The exchange of information or agreement between administrators of SAML providers on how to link user accounts between systems. For example, what data does the identity provider pass to the service pr [..]
Source: help.sap.com

294

0 Thumbs up   0 Thumbs down

SECURITY


Administrator that can add, modify and delete users of all companies.
Source: help.sap.com

295

0 Thumbs up   0 Thumbs down

SECURITY


PAOS is a reverse HTTP-binding for the SOAP protocol. It is a reverse binding because the HTTP response is bound the SOAP request instead of the HTTP request.
Source: help.sap.com

296

0 Thumbs up   0 Thumbs down

SECURITY


Password that is longer than a traditional password and may consist of more than one word.
Source: help.sap.com

297

0 Thumbs up   0 Thumbs down

SECURITY


A deliberate attempt to evade security to gain information from a system, for example, wiretapping or other forms of eavesdropping.
Source: help.sap.com

298

0 Thumbs up   0 Thumbs down

SECURITY


Credentials contain data that enables the subject to perform certain activities. A credential may contain information, which is used to authenticate the subject to new services. These credentials have [..]
Source: help.sap.com

299

0 Thumbs up   0 Thumbs down

SECURITY


The user or component-specific information that allows the user or component to access his or her security information.
Source: help.sap.com

300

0 Thumbs up   0 Thumbs down

SECURITY


Local storage location for each certification revocation list (CRL) that is downloaded from a CRL distribution point.
Source: help.sap.com

301

0 Thumbs up   0 Thumbs down

SECURITY


Publicly available location where a Certification Authority (CA) hosts its certificate revocation list (CRL).
Source: help.sap.com

302

0 Thumbs up   0 Thumbs down

SECURITY


The act of serving content from or diverting a Web client to a different domain without the user's knowledge.
Source: help.sap.com

303

0 Thumbs up   0 Thumbs down

SECURITY


Analysis procedure for decrypting encrypted messages sent over computer networks without knowing the key.
Source: help.sap.com

304

0 Thumbs up   0 Thumbs down

SECURITY


A class of attacks against application servers that tricks an authenticated user into issuing HTTP requests to an application, which can then lead to an undesired action being triggered on behalf of t [..]
Source: help.sap.com

305

0 Thumbs up   0 Thumbs down

SECURITY


A cryptographic algorithm that uses a 56-bit secret key for encrypting and decrypting messages (symmetric cryptrography).
Source: help.sap.com

306

0 Thumbs up   0 Thumbs down

SECURITY


Correctness and appropriateness of the content and/or source of data sent over the Internet.
Source: help.sap.com

307

0 Thumbs up   0 Thumbs down

SECURITY


The data being transferred between the client and the server is encrypted, which provides for integrity and privacy protection. An eavesdropper cannot access or manipulate the data.
Source: help.sap.com

308

0 Thumbs up   0 Thumbs down

SECURITY


The data repository from which the User Management Engine (UME) of the J2EE Engine retrieves user management data such as user, group, and role data.
Source: help.sap.com

309

0 Thumbs up   0 Thumbs down

SECURITY


Authentication concept that releases a component from having to trigger authentication itself. Instead the component declares its protected resources and its desired authentication mechanism in its de [..]
Source: help.sap.com

310

0 Thumbs up   0 Thumbs down

SECURITY


The conversion of an encoded message into its original form.
Source: help.sap.com

311

0 Thumbs up   0 Thumbs down

SECURITY


The process of retrieving data that has been encrypted using a cryptographic algorithm.
Source: help.sap.com

312

0 Thumbs up   0 Thumbs down

SECURITY


In identity management this is the action of ending federation. Here federation provides the means to share identity information between partners. To share information about a user, partners must be a [..]
Source: help.sap.com

313

0 Thumbs up   0 Thumbs down

SECURITY


Allows you to distribute user administration between several administrators so that each administrator is responsible for a particular group of users.
Source: help.sap.com

314

0 Thumbs up   0 Thumbs down

SECURITY


Administrator that can add, modify and delete users that belong to the same company as the delegated user administrator only.
Source: help.sap.com

315

0 Thumbs up   0 Thumbs down

SECURITY


An area that exists between two networks that allows connections between the networks without sacrificing unauthorized access to the systems located within the networks.
Source: help.sap.com

316

0 Thumbs up   0 Thumbs down

SECURITY


The process of opening a digital envelope.
Source: help.sap.com

317

0 Thumbs up   0 Thumbs down

SECURITY


Security protocol that allows parties with no prior knowledge of each other to agree on a shared key for encrypting further communication.
Source: help.sap.com

318

0 Thumbs up   0 Thumbs down

SECURITY


A security mechanism for protecting digital data.
Source: help.sap.com

319

0 Thumbs up   0 Thumbs down

SECURITY


Process of identifying a person or system component using a cryptographic hash value to avoid sending the user ID and password in clear text.
Source: help.sap.com

320

0 Thumbs up   0 Thumbs down

SECURITY


An electronic "identity card" that establishes a user's credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA) and contains nam [..]
Source: help.sap.com

321

0 Thumbs up   0 Thumbs down

SECURITY


Tree-like structure in which entries in a directory are organized.
Source: help.sap.com

322

0 Thumbs up   0 Thumbs down

SECURITY


A type of attack during which the attacker exploits a flaw in the security of an application to gain access to directories. An attacker can then read or insert data.
Source: help.sap.com

323

0 Thumbs up   0 Thumbs down

SECURITY


A hierarchical identifier for an object as specified by the X.500 format.
Source: help.sap.com

324

0 Thumbs up   0 Thumbs down

SECURITY


Document domain defines the circumstances in which two different applications can share information between two different windows or frames on the client side. The Same Origin Policy (SOP) applies. Tw [..]
Source: help.sap.com

325

0 Thumbs up   0 Thumbs down

SECURITY


Document domain relaxing is the loosing of the Same Origin Policy (SOP).The SOP states that two applications in two different frames or windows can share information only if the protocol, fully-qualif [..]
Source: help.sap.com

326

0 Thumbs up   0 Thumbs down

SECURITY


A group of computers and devices that belong to the same (sub-)network according to their IP addresses (or corresponding aliases).
Source: help.sap.com

327

0 Thumbs up   0 Thumbs down

SECURITY


A cryptographic procedure introduced by SET, an electronic payment system, to ensure data protection during business transactions.
Source: help.sap.com

328

0 Thumbs up   0 Thumbs down

SECURITY


The conversion of a plain-text message into a coded message using an algorithm where no cryptography is involved.
Source: help.sap.com

329

0 Thumbs up   0 Thumbs down

SECURITY


The process of using a cryptographic algorithm to disguise a message to protect it from being intercepted by potential eavesdroppers.
Source: help.sap.com

330

0 Thumbs up   0 Thumbs down

SECURITY


A profile of the Security Assertion Markup Language (SAML) 2.0. The profile enables browsers with enhanced capabilities to take advantage of identity provider discovery and SAML message flow options. [..]
Source: help.sap.com

331

0 Thumbs up   0 Thumbs down

SECURITY


Chargeable software component that is not exclusively calculated for each user.
Source: help.sap.com

332

0 Thumbs up   0 Thumbs down

SECURITY


A component of the SAP NetWeaver Single Sign-On product that enables users to automatically log on to Windows, Windows applications,and web sites.
Source: help.sap.com

333

0 Thumbs up   0 Thumbs down

SECURITY


The process of creating a digital envelope.
Source: help.sap.com

334

0 Thumbs up   0 Thumbs down

SECURITY


Part of SAP User Management Engine that provides connectivity to the user management data sources. It allows the persistence manager to access data from a certain type of data source, for example, LDA [..]
Source: help.sap.com

335

0 Thumbs up   0 Thumbs down

SECURITY


Part of SAP User Management Engine between the application programming interface and the user management data sources.
Source: help.sap.com

336

0 Thumbs up   0 Thumbs down

SECURITY


In SAML 2.0 an permanent identifier for a principal that does not reveal private information about the principal.
Source: help.sap.com

337

0 Thumbs up   0 Thumbs down

SECURITY


To associate or link a number of entities.
Source: help.sap.com

338

0 Thumbs up   0 Thumbs down

SECURITY


A function that is secured with the Secure Sockets Layer (SSL) protocol.
Source: help.sap.com

339

0 Thumbs up   0 Thumbs down

SECURITY


A special server in computer networks that prevents unauthorized penetration (dialling in) of external people and/or the transfer of data that is not to be transferred.
Source: help.sap.com

340

0 Thumbs up   0 Thumbs down

SECURITY


A communication channel that uses the standard communication channel. For SAML 2.0, the front channel is between the identity provider and theservice providers, but goes over the user agent (such as a [..]
Source: help.sap.com

341

0 Thumbs up   0 Thumbs down

SECURITY


An application level interface (API) for network security systems.
Source: help.sap.com

342

0 Thumbs up   0 Thumbs down

SECURITY


German Federal office that is responsible for information technology
Source: help.sap.com

343

0 Thumbs up   0 Thumbs down

SECURITY


A set of users with specified security permissions.
Source: help.sap.com

344

0 Thumbs up   0 Thumbs down

SECURITY


A physical device that can be attached to a server to provide a means for storing digital keys and for performing cryptographic functions.
Source: help.sap.com

345

0 Thumbs up   0 Thumbs down

SECURITY


An algorithm that you can apply to a message or text that guarantees the message's integrity.
Source: help.sap.com

346

0 Thumbs up   0 Thumbs down

SECURITY


Subject confirmation method for desktop-to-server communication where a central security token service (STS) asserts the identity of a user. The STS issues a SAML token containing this information. Th [..]
Source: help.sap.com

347

0 Thumbs up   0 Thumbs down

SECURITY


Role that contains the central functions for the end user in SAP NetWeaver Business Client (NWBC).
Source: help.sap.com

348

0 Thumbs up   0 Thumbs down

SECURITY


A connection which provides for encrypted communications between the client and the server.
Source: help.sap.com

349

0 Thumbs up   0 Thumbs down

SECURITY


The act of determining which SAML identity provider to use when a client requests access to a particular resource of the SAML service provider.
Source: help.sap.com

350

0 Thumbs up   0 Thumbs down

SECURITY


The act of joining the identity data of a principal across multiple systems through the use of a common token.
Source: help.sap.com

351

0 Thumbs up   0 Thumbs down

SECURITY


An organization for developing Internet standards.
Source: help.sap.com

352

0 Thumbs up   0 Thumbs down

SECURITY


Piece of information used for user authentication and Single Sign-On with SAP systems.
Source: help.sap.com

353

0 Thumbs up   0 Thumbs down

SECURITY


Digital certificate attribute where the Distinguished Name of the Certification Authority (CA) that issued the digital certificate is specified.
Source: help.sap.com

354

0 Thumbs up   0 Thumbs down

SECURITY


A class object in the Java Authentication and Authorization Service (JAAS). The subject identifies a person or service or other entity in the JAAS framework. The subject can include principals, such a [..]
Source: help.sap.com

355

0 Thumbs up   0 Thumbs down

SECURITY


One of a collection of connections held ready-for-use when a connection between systems is required.
Source: help.sap.com

356

0 Thumbs up   0 Thumbs down

SECURITY


The set of security restrictions for a component on the J2EE Engine. This includes the login module stack, security roles, and resources that are assigned to the component.
Source: help.sap.com

357

0 Thumbs up   0 Thumbs down

SECURITY


A token endpoint is used by the OAuth 2.0 client to obtain an access token presenting its authorization grant or refresh token.
Source: help.sap.com

358

0 Thumbs up   0 Thumbs down

SECURITY


SAP System tool (transaction SSO2) to assist you with the configuration of logon tickets for Single Sign-On (SSO).
Source: help.sap.com

359

0 Thumbs up   0 Thumbs down

SECURITY


Alert in the Computing Center Management System (CCMS) alert monitor that has been produced by the Security Audit Log.
Source: help.sap.com

360

0 Thumbs up   0 Thumbs down

SECURITY


A cryptographic procedure in which the sender and receiver use the same key to encrypt and decrypt a message sent over computer networks.
Source: help.sap.com

361

0 Thumbs up   0 Thumbs down

SECURITY


Default security product provided by SAP to use for encryption with SAP Systems.
Source: help.sap.com

362

0 Thumbs up   0 Thumbs down

SECURITY


A popular program used to encrypt and decrypt e-mail over the Internet.
Source: help.sap.com

363

0 Thumbs up   0 Thumbs down

SECURITY


Security mechanism that protects a message from being viewed by anyone other than the intended recipient.
Source: help.sap.com

364

0 Thumbs up   0 Thumbs down

SECURITY


A condition that occurs when a system or server, for example, is flooded with requests or data, causing its resources to be exhausted and making it inaccessible or unable to function.
Source: help.sap.com

365

0 Thumbs up   0 Thumbs down

SECURITY


A location in the SAP Web Application Server ABAP database where you can store certificates belonging to Certification Authorities (CAs).
Source: help.sap.com

366

0 Thumbs up   0 Thumbs down

SECURITY


A process of identifying a person or system component, usually as a prerequisite for allowing the person or component access to the system.
Source: help.sap.com

367

0 Thumbs up   0 Thumbs down

SECURITY


The report generated from the Security Audit Log.
Source: help.sap.com

368

0 Thumbs up   0 Thumbs down

SECURITY


The mapping of accounts in different systems to the same principal, so that both systems can communicate about that principal.
Source: help.sap.com

369

0 Thumbs up   0 Thumbs down

SECURITY


An authentication system developed at the Massachusetts Institute of Technology (MIT).
Source: help.sap.com

370

0 Thumbs up   0 Thumbs down

SECURITY


The Kerberos Principal Name identifies a Kerberos user or a Kerberos service.
Source: help.sap.com

371

0 Thumbs up   0 Thumbs down

SECURITY


Server used in a Kerberos scenario that authenticates users and issues them their tickets.
Source: help.sap.com

372

0 Thumbs up   0 Thumbs down

SECURITY


A keytab file contains a list of Kerberos keys. Keytab files are used to provide Kerberos identities to services (compared to user principals whose keys can be generated from a password at the beginni [..]
Source: help.sap.com

373

0 Thumbs up   0 Thumbs down

SECURITY


The LDAP Connector interface is a collection of function modules with which you can access a directory server using the LDAP Connector. The function modules are geared to the operations available in t [..]
Source: help.sap.com

374

0 Thumbs up   0 Thumbs down

SECURITY


In RBAM, the POP method removes the topmost element from the stack. This happens when the call - for which this element was put onto the stack (PUSH) # is finished.
Source: help.sap.com

375

0 Thumbs up   0 Thumbs down

SECURITY


A role defined in a portal.
Source: help.sap.com

376

0 Thumbs up   0 Thumbs down

SECURITY


Identity that the server acts under for a Web service for security purposes. Each WS-Security identity possesses its own WS-Security Personal Security Environment (PSE).
Source: help.sap.com

377

0 Thumbs up   0 Thumbs down

SECURITY


Personal Security Environment (PSE) to use for Web services.
Source: help.sap.com

378

0 Thumbs up   0 Thumbs down

SECURITY


A set of criteria for evaluating computer security.
Source: help.sap.com

379

0 Thumbs up   0 Thumbs down

SECURITY


Tool for centrally consolidating license auditing data.
Source: help.sap.com

380

0 Thumbs up   0 Thumbs down

SECURITY


Windows authentication, with which Windows performs a permissible authentication (for example, with NTLM or Kerberos).
Source: help.sap.com

381

0 Thumbs up   0 Thumbs down

SECURITY


A user that exists only in the main memory of the application and is not saved as a record in the user data source. This user is created programmatically to fulfill a special purpose in connection wit [..]
Source: help.sap.com

382

0 Thumbs up   0 Thumbs down

SECURITY


List of steps that are to be processed during a scan.
Source: help.sap.com

383

0 Thumbs up   0 Thumbs down

SECURITY


Executable program that integrates the virus scanner of a certified vendor using an interface and provides scan services to the application servers of the system as a registered RFC server.
Source: help.sap.com

384

0 Thumbs up   0 Thumbs down

SECURITY


A private data network that makes use of the public telecommunication infrastructure and maintains privacy through the use of a tunneling protocol and security procedures.
Source: help.sap.com

385

0 Thumbs up   0 Thumbs down

SECURITY


A guest user that exists only in program memory. Such a guest user is created programmatically and is not saved as a user record in the user data source.
Source: help.sap.com

386

0 Thumbs up   0 Thumbs down

SECURITY


A security token that is defined in the WS Security standard. It is a mechanism with which the user ID and password can be transported within a SOAP message.
Source: help.sap.com

387

0 Thumbs up   0 Thumbs down

SECURITY


Service provider in the J2EE Engine that stores user management data such as user and group data.
Source: help.sap.com

388

0 Thumbs up   0 Thumbs down

SECURITY


The name of a system user in an e-mail address format. The user name (or"username") is followed by the "at sign" followed by the name of the Internet domain with which the user is [..]
Source: help.sap.com

389

0 Thumbs up   0 Thumbs down

SECURITY


A Java-based user management component that features centralized user management, Single Sign-On (SSO), and secure access to distributed applications.
Source: help.sap.com

390

0 Thumbs up   0 Thumbs down

SECURITY


An instrument representing ownership (stocks), a debt agreement (bonds) or the rights to ownership (derivatives).
Source: unicreditgroup.eu

391

0 Thumbs up   0 Thumbs down

SECURITY


The property that will be pledged as collateral for a loan.
Source: plainscommercemortgage.com

392

0 Thumbs up   0 Thumbs down

SECURITY


A security is a charge or mortgage taken on assets [i.e. a house] in order to secure payment of debt. Shadow Director
Source: mbiequity.co.uk (offline)

393

0 Thumbs up   0 Thumbs down

SECURITY


A charge or mortgage over assets taken to secure a payment of a debt. If the debt is not paid, the lender has a right to sell the charged assets. The commonest example is a mortgage over a property.
Source: mercerhole.co.uk

394

0 Thumbs up   0 Thumbs down

SECURITY


A charge or mortgage over assets taken to secure payments of a debt. If the debt is not paid, the lender has a right to sell the charged assets. Security documents can be very complex. The commonest e [..]
Source: forbesburton.com

395

0 Thumbs up   0 Thumbs down

SECURITY


A security is a charge or mortgage over assets taken to secure payment of a debt. If the debt is not paid, the lender has a right to sell the charged assets. The commonest example is a mortgage over a [..]
Source: kingsbridgecs.com

396

0 Thumbs up   0 Thumbs down

SECURITY


Protection from harm. In eCommerce terms, security is ensuring that transactions are not open to fraud. In eCommerce systems, security protocols protect the consumer, the merchant and the bank from ha [..]
Source: cardinalcommerce.com

397

0 Thumbs up   0 Thumbs down

SECURITY


The property that will be pledged as collateral for a loan.
Source: firstcommercefinancial.com (offline)

398

0 Thumbs up   0 Thumbs down

SECURITY


A security offers protection that an obligation will be met. A developer may be required to post a security, such as a bond or a letter of credit, as a means of recourse should he or she fail to compl [..]
Source: cmhc-schl.gc.ca

399

0 Thumbs up   0 Thumbs down

SECURITY


24hr desk clerk / security staff; offers assistance to persons who may request accompaniment to their room; offers secure storage facilities for guests' valuables. Smoke detectors
Source: pss.gov.bc.ca (offline)

400

0 Thumbs up   0 Thumbs down

SECURITY


 – A document issued by a party acceptable to market participants, offering evidence of ownership of an asset whereby possession of the document signifies ownership. Transfer of ownership requires the presentation or handing over of the security. More generally the term is applied to all shares, debentures, notes, bills, government and semi-governm [..]
Source: australianstockreport.com.au (offline)

401

0 Thumbs up   0 Thumbs down

SECURITY


Instrument that signifies an ownership position in a corporation (a stock), a creditor relationship with a corporation or governmental body (a bond), or rights to ownership (e.g., option). 
Source: ase.com.jo (offline)

402

0 Thumbs up   0 Thumbs down

SECURITY


a tradable financial instrument such as a stock, bond or option
Source: moneysense.ca

403

0 Thumbs up   0 Thumbs down

SECURITY


the ability of software to operate in a manner that is secure from internal or external attack
Source: rspa.com

404

0 Thumbs up   0 Thumbs down

SECURITY


lang=en 1600s=1678 |1800s=1813
1843 * '''1678''' — . ''''. *: Then I stepped to him that plucked him out, and said, Sir, wherefore, since over this place is the way from the City of Destruction [..]
Source: en.wiktionary.org

405

0 Thumbs up   0 Thumbs down

SECURITY


The property that will be pledged as collateral for a loan. If the borrower defaults, the lender can sell the collateral to satisfy the debt.
Source: txlandgroup.com (offline)

406

0 Thumbs up   0 Thumbs down

SECURITY


property pledged to ensure payment of a debt; collateral
Source: sandygadow.com

407

0 Thumbs up   0 Thumbs down

SECURITY


The state of being free from danger or threat
Source: pacificclimatechange.net

408

0 Thumbs up   0 Thumbs down

SECURITY


Piece of paper that proves ownership of stocks, bonds, and other investments.
Source: people.duke.edu

409

0 Thumbs up   0 Thumbs down

SECURITY


Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social gro [..]
Source: en.wikipedia.org

410

0 Thumbs up   0 Thumbs down

SECURITY


Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social gro [..]
Source: en.wikipedia.org

411

0 Thumbs up   0 Thumbs down

SECURITY


Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social gro [..]
Source: en.wikipedia.org

412

0 Thumbs up   0 Thumbs down

SECURITY


A security is a tradable financial asset. The term commonly refers to any form of financial instrument, but its legal definition varies by jurisdiction. In some countries and languages the term "secur [..]
Source: en.wikipedia.org

413

0 Thumbs up   0 Thumbs down

SECURITY


A security is a tradable financial asset. The term commonly refers to any form of financial instrument, but its legal definition varies by jurisdiction. In some countries and languages the term "secur [..]
Source: en.wikipedia.org

414

0 Thumbs up   0 Thumbs down

SECURITY


Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social gro [..]
Source: en.wikipedia.org

415

0 Thumbs up   0 Thumbs down

SECURITY


Security is the degree of protection against danger, damage, loss, and crime. Security may also refer to: Airport security Computer security Energy security Food security Individual security, a huma [..]
Source: en.wikipedia.org





<< SECURED LOAN SEMIDETACHED HOUSING >>

Dictionary.university is a dictionary written by people like you and me.
Please help and add a word. All sort of words are welcome!

Add meaning