DictionaryForumContacts

   Russian
Terms for subject Microsoft containing атака | all forms | exact matches only
RussianEnglish
атака "злоумышленник в середине"man-in-the-middle attack (A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack the users are unaware that there is an attacker between them intercepting and modifying their data)
атака "злоумышленник в середине"bucket brigade attack (A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack the users are unaware that there is an attacker between them intercepting and modifying their data)
атака методом подбораkey search attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
атака методом подбораbrute force attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
атака перебором по словарюdictionary attack (A method of guessing a user's password or PIN by trying every word in the dictionary until successful)
атака подбором пароляhammering attack (A key search attack in which an unauthorized user guesses at a PIN or password many times)
атака путём внедрения кода SQLSQL injection attack (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application)
атака путём внедрения сценарияscript injection attack (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code)
атака путём подделки записей кэшаpoisoning intrusion (A type of intrusion that targets the DNS (Domain Name System) or the DHCP (Dynamic Host Configuration Protocol) and which directs end users to malicious websites)
атака с заманиваниемluring attack (An attack in which the client is lured to voluntarily connect to the attacker)
атака с целью сбора действующих адресовdirectory harvest attack (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database)
атака типа "отказ в обслуживании"denial-of-service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
атака типа "отказ в обслуживании"denial of service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
атака типа отказ в обслуживанииDoS
Защита IPsec от DoS-атакIPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks)
локальная атакаlocal attack
обнаружение атаки путём подделки записей кэшаanti-poisoning intrusion detection
почтовая атакаmail bomb
почтовая атакаe-mail bomb
предотвращение Flood-атакиFlood Mitigation
предотвращение Flood-атакиflood attack mitigation (A configuration setting used by ISA Server to prevent various flood attacks)
распределённая атака типа отказ в обслуживанииdistributed denial of service
система обнаружения атакintrusion detection system (A type of security management system for computers and networks. Intrusion detection systems (IDS) provide real-time monitoring of network traffic. An IDS can detect a wide range of hostile attack signatures (patterns), generate alarms to alert operations staff and, in some cases, cause routers to terminate communications from hostile sources)
удалённая атакаremote attack