System Integrity Check
Key Facts
Abbreviation
SIC
Pronunciation
/ˈsɪstəm ˌɪnˈtɛgrəti ʧɛk/
Category
Computing
Related Field
Cyber & Security
Examples in Context
- WEP uses CRC32 checking code inside the RC4 encipher system to provide message integrity check.
- File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders.
- The encrypted file system provides safe user authentication, file encryption and decryption, file integrity check, and file management based on directory.
- The application of digital signature technique to network-based office system can provide identity verification service, authorization level control, information secrecy safeguard, data integrity check and denial-defense.
Other meanings of SIC
Silicon Carbide
Academic
Standard Industrial Classification
Business
Securities Investment Company
Business