-
1 guessing attack
анализ, основанный на предположенияхАнгло-русский словарь по компьютерной безопасности > guessing attack
-
2 key-guessing attack
атака с угадыванием ключа
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > key-guessing attack
-
3 key-guessing attack secure
защищенный от атаки с угадыванием ключа
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > key-guessing attack secure
-
4 attack
1) нападение; атака, реализация угрозы2) действие нарушителя по перехвату информации; злонамеренное (воз) действие3) криптоанализ; метод криптоанализа (см. тж. cryptanalysis) -
5 game
1) игра || играть•game in an extensive form — игра в развёрнутой форме, позиционная игра
game in a reduced form — игра в приведённой форме, приведённая игра
- almost unanimity game - coin matching game - coin tossing game - completely reduced game - constraint gamegame without constraints — игра без ограничений, свободная игра
- end game- fixed sample-size game - game of harmstrung squad car - game of heads or tails - game of odd man out - game of pure chance - game of pursuit and evasion - identification of friend and foe game - inherently unstable game - locally bounded game - locally finite game - machine played game - nonstrictly determined game - one-player game - strictly solvable game - termination game - two-person game - two-player game- war game- weighted majority game - zero-sum two-person game -
6 password
= PSWDкод (уникальная последовательность символов), необходимый пользователю для получения доступа к закрытой (защищённой) системе или сервисуАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > password
См. также в других словарях:
Directory Harvest Attack — A Directory Harvest Attack or DHA is a technique used by spammers in an attempt to find valid/existent e mail addresses at a domain by using brute force. The attack is usually carried out by way of a standard dictionary attack, where valid e mail … Wikipedia
Timing attack — In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that every operation in a computer … Wikipedia
Known-plaintext attack — The known plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has samples of both the plaintext (called a crib), and its encrypted version (ciphertext). These can be used to reveal further secret information such as… … Wikipedia
атака с угадыванием ключа — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN key guessing attack … Справочник технического переводчика
защищенный от атаки с угадыванием ключа — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN key guessing attack secure … Справочник технического переводчика
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
Ciphertext indistinguishability — is a property of many encryption schemes. Intuitively, if a cryptosystem possesses the property of indistinguishability, then an adversary will be unable to distinguish pairs of ciphertexts based on the message they encrypt. The property of… … Wikipedia
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Dan Kaminsky — Kaminsky in 2007. Occupation Computer security researcher Known for Discovering the 2008 DNS cache poisoning vulnerability Dan Kam … Wikipedia
Address space layout randomization — (ASLR) is a computer security technique which involves randomly arranging the positions of key data areas, usually including the base of the executable and position of libraries, heap, and stack, in a process s address space. Benefits Address… … Wikipedia