Russian | English |
атака "злоумышленник в середине" | man-in-the-middle attack (A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack the users are unaware that there is an attacker between them intercepting and modifying their data) |
атака "злоумышленник в середине" | bucket brigade attack (A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack the users are unaware that there is an attacker between them intercepting and modifying their data) |
атака методом подбора | key search attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
атака методом подбора | brute force attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
атака перебором по словарю | dictionary attack (A method of guessing a user's password or PIN by trying every word in the dictionary until successful) |
атака подбором пароля | hammering attack (A key search attack in which an unauthorized user guesses at a PIN or password many times) |
атака путём внедрения кода SQL | SQL injection attack (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application) |
атака путём внедрения сценария | script injection attack (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code) |
атака путём подделки записей кэша | poisoning intrusion (A type of intrusion that targets the DNS (Domain Name System) or the DHCP (Dynamic Host Configuration Protocol) and which directs end users to malicious websites) |
атака с заманиванием | luring attack (An attack in which the client is lured to voluntarily connect to the attacker) |
атака с целью сбора действующих адресов | directory harvest attack (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database) |
атака типа "отказ в обслуживании" | denial-of-service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
атака типа "отказ в обслуживании" | denial of service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
атака типа отказ в обслуживании | DoS |
Защита IPsec от DoS-атак | IPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
локальная атака | local attack |
обнаружение атаки путём подделки записей кэша | anti-poisoning intrusion detection |
почтовая атака | mail bomb |
почтовая атака | e-mail bomb |
предотвращение Flood-атаки | Flood Mitigation |
предотвращение Flood-атаки | flood attack mitigation (A configuration setting used by ISA Server to prevent various flood attacks) |
распределённая атака типа отказ в обслуживании | distributed denial of service |
система обнаружения атак | intrusion detection system (A type of security management system for computers and networks. Intrusion detection systems (IDS) provide real-time monitoring of network traffic. An IDS can detect a wide range of hostile attack signatures (patterns), generate alarms to alert operations staff and, in some cases, cause routers to terminate communications from hostile sources) |
удалённая атака | remote attack |