-
1 malicious user
A user who intentionally accesses a system with the intent to cause harm to the system or to use it in an unauthorized manner. -
2 malicious call reporting
"A feature that enables phone users to report disturbing calls to the system administrator. When the user selects to report a malicious call, data from the last call received is captured and sent to the system administrator." -
3 elevation of privilege
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information." -
4 elevation
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information." -
5 phisher
"A malicious user who deceives people into revealing personal information, such as account passwords and credit card numbers. A phisher typically uses deceptive e-mail messages or online advertisements as bait to lure unsuspecting users to fraudulent websites, where the users are then tricked into providing personal information." -
6 antivirus program
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
7 antivirus software
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
8 AV
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected."[lang name="Arabic"]AV -
9 antimalware software
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
10 antimalware program
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
11 denial-of-service attack
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
12 denial of service attack
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
13 DoS
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
14 cross-site request forgery
An attack where a malicious website makes an HTTP request to a target website in such a way that the website thinks that the request is part of a legitimate user’s session.English-Arabic terms dictionary > cross-site request forgery
-
15 CSRF
An attack where a malicious website makes an HTTP request to a target website in such a way that the website thinks that the request is part of a legitimate user’s session.
См. также в других словарях:
User-mode Linux — (UML) allows multiple virtual Linux systems (known as guests) to run as an application within a normal Linux system (known as the host). As each guest is just a normal application running as a process in user space, this approach provides the… … Wikipedia
Malicious Caller Identification — (MCI), also called Malicious Call Trace (MCT) or Caller Activated Malicious Call Trace (CAMCT) is a facility which enables a phone call recipient to mark a phone call as malicious (i.e. harassing, threatening, obscene, etc.) The phone system will … Wikipedia
user — noun ADJECTIVE ▪ avid (esp. AmE), heavy, large ▪ heavy users of credit ▪ The larger users of the service have to pay more. ▪ small … Collocations dictionary
malicious — adj. VERBS ▪ be ADVERB ▪ rather ▪ He gave a rather malicious smile at her furious expression. Malicious is used with these nouns: ↑allegation, ↑code, ↑ … Collocations dictionary
malicious-logic software — n. malware, software that acts on computer files without the knowledge of the user, general name for computer viruses … English contemporary dictionary
reasonable user — The use of property by a co owner which is not capricious, irresponsible, or malicious, but in one of the ordinary methods of reaping profits from property of like character and in like circumstances. 20 Am J2d Coten § 37. Where two persons own a … Ballentine's law dictionary
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
Buffer overflow — In computer security and programming, a buffer overflow, or buffer overrun, is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent… … Wikipedia
Secure by design — Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken for granted and care is taken to minimize impact when a security vulnerability is discovered. For… … Wikipedia
Format string attack — Format string attacks are a class of software vulnerability discovered around 1999. Previously thought harmless, Format string attacks can be used to crash a program or to execute harmful code. The problem stems from the use of unfiltered user… … Wikipedia