Examples of using Integrity and availability in English and their translations into Russian
{-}
-
Official
-
Colloquial
The strategic approach for the adoption of the new system did not adequately consider the fundamental requirements for data confidentiality, integrity and availability.
Cybercrime offences against confidentiality, integrity and availability of computer systems
Such measures shall in particular ensure the confidentiality, integrity and availability of data by controlling physical access to the data as well as access to
The Quality Assurance team conducted an in-depth risk analysis which was used to determine measures to be implemented to protect the continued confidentiality, integrity and availability of information and to ensure the continued functioning of information technology systems.
hardware that can be used for the commission of crimes against confidentiality, integrity and availability of computer systems or data.
the basic principles of which are confidentiality, integrity and availability of information.
advocated safeguarding the confidentiality, integrity and availability of information.
processes to ensure confidentiality, integrity and availability of ICT resources and data.
offences against the confidentiality, integrity and availability of computer data
the confidentiality of information, it is in most cases essential to preserve the integrity and availability of the information.
control objectives contained in ISO/IEC 17799, which focuses on safeguarding confidentiality, integrity and availability, as defined below.
confidentiality, integrity, and availability.
It is important that we strengthen our international partnerships to address increasingly sophisticated threats to the reliability, integrity, and availability of the ICTs on which we all increasingly rely.
Security personnel are usually required to design for the confidentiality, integrity, and availability of computer systems.
Supplier's information security program must reasonably address the confidentiality, integrity, and availability of all Seagate Data,
augments GPS over the North American territory to provide the additional accuracy, integrity, and availability needed to enable users to rely on GPS for safety-critical applications, particularly in the fi eld of aviation.
4.3.30 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core.
Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
Requirements such as confidentiality, integrity and availability ensure efficient network use.