-
1 eavesdropping vulnerability
Универсальный англо-русский словарь > eavesdropping vulnerability
-
2 eavesdropping vulnerability
уязвимость к применению устройств подслушивания, уязвимость к подслушиваниюАнгло-русский словарь по компьютерной безопасности > eavesdropping vulnerability
-
3 vulnerability
уязвимость; чувствительностьАнгло-русский словарь по компьютерной безопасности > vulnerability
См. также в других словарях:
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Radiofrequency MASINT — is one of the six major disciplines generally accepted to make up the field of Measurement and Signature Intelligence (MASINT), with due regard that the MASINT subdisciplines may overlap, and MASINT, in turn, is complementary to more traditional… … Wikipedia
Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… … Wikipedia
Hacker (computer security) — This article is part of a series on … Wikipedia
Project 25 — (P25 or APCO 25) is a suite of standards for digital radio communications for use by federal, state/province and local public safety agencies in North America to enable them to communicate with other agencies and mutual aid response teams in… … Wikipedia
HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Norton Internet Security — The main, simplified graphical user interface of Norton Internet Security 2012 … Wikipedia
Pharming — For pharming in genetics, see pharming (genetics). For pharming in drug abuse, see pharming parties. Pharming (pronounced farming) is a hacker s attack aiming to redirect a website s traffic to another, bogus website. Pharming can be conducted… … Wikipedia