Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Simulated phishing

Глоссарий терминов по социальной инженерии и информационной безопасности
    An exercise which involves computer users being sent phishing-type emails to investigate their susceptibility to phishing attacks. this can also be used as a training and security awareness tool.




Phish(ing), английский
  1. An e-mail or website designed to redirect you to a bogus website with the intention of gaining bank or credit card information, or to download malicious program onto a computer without the users knowledge.

  2. The technique is also often used to secure credit card numbers, bank account information, brokerage information, and generally anything that could yield a financial gain in line with fraud operations.


Phisher, английский
    A malicious user who deceives people into revealing personal information, such as account passwords and credit card numbers. a phisher typically uses deceptive email messages or online advertisements as bait to lure unsuspecting users to fraudulent websites, where the users are then tricked into providing personal information.


Phishing, английский
  1. A technique used to trick computer users into revealing personal or financial information. a common online phishing scam starts with an e-mail message that appears to come from a trusted source but actually directs recipients to provide information to a fraudulent web site. phishing

  2. A social engineering technique in which the attacker masquerades as a legitimate website or communication in order to acquire sensitive information, such as passwords or credit card information. phishing messages can arrive via email, sms, tweets, instant messages, qr codes, or social media status updates. phishing emails are also used as a delivery method for ransomware that exhorts users to click on an attachment or url where malicious code encrypts their files in a matter of seconds. there are a number of techniques which can be used to help identify whether a suspicious email is a phishing attempt, such as examining the email headers, but there is no silver bullet. one of the safest ways to check the authenticity of a suspicious email is to contact the sender by phoning them – an old-fashioned solution to a modern problem.


Phishing confidence level, английский
    A value between 1 and 8 that is assigned to a message based on its content and that reflects the liklihood that the message is phishing.


Phishing filter, английский
    A filter that helps to identify fraudulent web sites and protect against personal data theft.


Phishing susceptibility framework, английский
    Framework that correlates user attributes, such as culture, age, gender and experiential factors (technology savviness and professional experience), to phishing attack susceptibility.


Phishing website, английский
    A web site that impersonates a trustworthy web site to obtain user’s personal or financial information. phone (n)


Simulate, английский
    Моделировать; имитировать; воспроизводить в лабораторных условиях


Simulate, латинский

Simulated aircraft maintenance trainer, английский
    Тренажер для обучения техническому обслуживанию ла


Simulated annealing, английский
    A monte carlo based maximization/minimization technique used for complex problems with many parameters and constraints. it mimics the process of annealing, which starts with a high temperature mix of metal and slowly cools the mix, allowing optimal structures to form as the material cools. the simulated annealing procedure randomly generates a large number of possible solutions, keeping both good and bad solutions. these are randomly perturbed and can replace the existing solutions, even when the are worse. as the simulation progresses, the requirements for replacing an existing solution or staying in the pool becomes stricter and stricter, mimicking the slow cooling of metallic annealing. eventually, the process yields a small set of optimal solutions. see also: gibbs sampling, markov chain monte carlo methods. single instruction multiple datastream (simd) single instruction multiple datastream (simd) is a computer architecture, where there are multiple processors each performing the same set of computations on their own data. see also: multiple instruction multiple datastream.


Simulated approach, английский
    Имитированный [моделируемый] заход на посадку


Simulated command module, английский
    Моделируемый отсек экипажа кла


Simulated contaminent test, английский
    Испытания гс в условиях искусственного загрязнения


Simulated deployment, английский
    A configuration option that lets you assess how accurate your application rules are before you deploy an application.


Simulated electronic launch minuteman, английский
    Электронный тренажер пуска ракеты «минитмен»


Simulated flameout, английский
    Имитация заглохания (двигателя)


Simulated flight manual, английский
    Имитируемый полет с ручным управлением


Simulated flight plan, английский
    Имитированный план полета


Simulated flight-automatic, английский
    Имитируемый полет с автоматическим управлением


Simulated full tv raster scan, английский
    Моделируемый полный телевизионный растр


Investigate, английский
  1. Исследовать; исследуйте

  2. Исследовать


Susceptibility, английский
  1. Lack of resistance to a disease ‘…low birthweight has been associated with increased susceptibility to infection’ [east african medical journal] ‘…even children with the milder forms of sickle-cell disease have an increased frequency of pneumococcal infection. the reason for this susceptibility is a profound abnormality of the immune system’ [lancet]

  2. Восприимчивость (к болезни)

  3. Склонность; чувствительность; восприимчивость о ~ to corrosion подверженность коррозии, склонность к коррозии; ~ to frost чувствительность к морозу; подверженность замерзанию; малая морозостойкость; ~

  4. Dimensionless property describing a material’s response to an external magnetic field.


Smishing (aka sms phishing), английский
    This is a technique whereby targets are sent sms messages from an attacker masquerading as a trustworthy entity who is requesting personal information. one popular smishing scam involves a message being sent to the target that informs them their credit card details have been compromised with an accompanying phone number. when the victim calls the number, their credit card information is requested.


Sim swap, английский
    This technique is commonly used to bypass two-factor authentication. the attacker obtains a victim’s personal information through a phishing scam. details such as the address, mobile telephone number and banking pin are collected. the attacker then socially engineers an employee at the victim’s mobile phone company into redirecting their calls and texts to a sim in their possession. once this has been achieved, the attacker now has access to the one-time verification codes that are sent by banks before payment transfers. the attacker can now redirect funds from the victim’s account to any account of their choosing.