Subject | Czech | English |
comp., MS | Filtr útoků phishing | Phishing Filter (A filter that helps to identify fraudulent Web sites and protect against personal data theft) |
h.rghts.act. | fyzický útok | physical abuse |
comp., MS | inferenční útok | inference attack (A type of security threat in which a malicious user is able to derive the value of data without actually accessing it, for example by monitoring the response time to a query) |
crim.law., IT | kybernetický útok | cyber attack |
comp., MS | možnosti útoku | surface area (The number of ways in which a piece of software can be attacked) |
comp., MS | Ochrana protokolu IPsec proti útokům DoS | IPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
comp., MS | Ochrana protokolu IPsec proti útokům s cílem způsobit odepření služby | IPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
comp., MS | pravděpodobnost útoku phishing | phishing confidence level (A value between 1 and 8 that is assigned to a message based on its content and that reflects the liklihood that the message is phishing) |
h.rghts.act. | sexuální útok | sexual assault |
comp., MS | slovníkový útok | dictionary attack (A method of guessing a user's password or PIN by trying every word in the dictionary until successful) |
gen. | teroristický útok | terrorist attack |
comp., MS | trojský program provádějící útok s cílem odepření služeb | Trojan denial of service attack (A type of Trojan that creates a denial of service attack) |
comp., MS | web útoku phishing | phishing website (A Web site that impersonates a trustworthy Web site to obtain user's personal or financial information) |
comp., MS | útok DoS | denial-of-service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
comp., MS | útok DoS | DoS (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
comp., MS | útok DoS | denial of service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
comp., MS | útok hammering | hammering attack (A key search attack in which an unauthorized user guesses at a PIN or password many times) |
comp., MS | útok hrubou silou | brute force attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
comp., MS | útok land attack | land attack (A denial-of-service attack (DoS) in which the attacker opens a legitimate TCP session with a spoofed source IP address and port number that match the IP address and port number of the targeted computer so that the targeted computer will try to establish a TCP session with itself, causing some TCP implementations to go into a loop and the computer to fail) |
comp., MS | útok na adresář | directory harvest attack (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database) |
comp., MS | útok na dostupnost služby | denial of service attack An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system (DOS) |
comp., MS | útok phishing | phishing (A technique used to trick computer users into revealing personal or financial information. A common online phishing scam starts with an e-mail message that appears to come from a trusted source but actually directs recipients to provide information to a fraudulent Web site) |
comp., MS | útok prostřednictvím injektáže skriptu | script injection attack (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code) |
comp., MS | útok prostřednictvím injektáže SQL | SQL injection attack (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application) |
comp., MS | útok s cílem zjistit klíč | key search attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
comp., MS | Časovaný útok | Time Attack Mode (A menu item on the Purble Place menu that allows the user to select a timed mode for their game) |