-
1 wiretapping attack
-
2 wiretapping attack
Англо-русский словарь по компьютерной безопасности > wiretapping attack
-
3 attack
1) нападение; атака, реализация угрозы2) действие нарушителя по перехвату информации; злонамеренное (воз) действие3) криптоанализ; метод криптоанализа (см. тж. cryptanalysis) -
4 tapping attack
(wiretapping attack) перехват информации посредством присоединения к проводной линии связиАнгло-русский словарь по компьютерной безопасности > tapping attack
См. также в других словарях:
1984 Rajneeshee bioterror attack — Infobox civilian attack title = 1984 Rajneeshee bioterror attack caption = Four of the restaurants in The Dalles affected by the attack location = The Dalles, Oregon, United States coordinates = coor dms|45|36|4|N|121|10|58|W|city (45.601218, 121 … Wikipedia
Replay attack — A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it,… … Wikipedia
NSA warrantless surveillance controversy — For the related controversy about data mining of domestic call records see NSA call database. National Security Agency logo The NSA warrantless surveillance controversy (AKA Warrantless Wiretapping ) concerns surveillance of persons within the… … Wikipedia
Telephone tapping — Wiretap redirects here. For the radio program, see WireTap (radio program). Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Congressional response to the NSA warrantless surveillance program — Congressional inquiries and investigations Three days after news broke about the Terrorist Surveillance Program, a bipartisan group of Senators Democrats Dianne Feinstein of California, Carl Levin of Michigan, Ron Wyden of Oregon and Republicans… … Wikipedia
1985 Rajneeshee assassination plot — Infobox civilian attack title = 1985 Rajneeshee assassination plot caption = The Gus J. Solomon United States Courthouse in Portland. location = Portland, Oregon USA coordinates = coord|45|30|57|N|122|40|35|W|display=inline,title target = United… … Wikipedia
Anthony Pellicano — Pellicano redirects here. For the detective fiction writer, see George Pelecanos. Anthony Pellicano (born March 22, 1944, in Chicago, Illinois) is a former high profile Los Angeles private investigator who recently served a sentence in federal… … Wikipedia
United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… … Universalium
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia