Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Clone phishing

Глоссарий терминов по социальной инженерии и информационной безопасности
    Occurs when the text and graphics of an authentic email that has been previously sent to the target (e.g. from a financial institution) is copied and resent to them. the “new” version of the email will generally be modified so that its content is faked or links are malicious.




Clone, английский
  1. One of a series of plants that is reproduced by cuttings or other vegetative methods for several generations. close 1. an enclosed space around or at the side of a building; esp. the neighborhood of a cathedral. 2. a narrow lane leading from a street.

  2. A group of cells derived from a single cell by asexual reproduction and so identical to the first cell  verb to reproduce an individual organism by asexual means

  3. Offspring of a single microbial cell

  4. A genetically identical cell or individual


Clone card, английский
    Карточка для просмотра кодированных тв программ


Clone chip, английский
    Клонированный кристалл; полностью идентичный кристалл


Clone fund, английский
    A new fund set up in a fund family to emulate another successful fund.


Clone tool, английский
    Инструмент "клонирование"


Clone tool picker, английский
    Указатель инструментов клонирования


Clone, syn. gene clone, английский
    Клон совокупность клеток или одноклеточных организмов, которые произошли от одной исходной клетки в результате вегетативного размножения. популяция генетически идентичных клеток, происходящих от одной родительской клетки.


Clonecd control file, английский

Cloned configuration, английский
    The practice of deploying new edge transport servers based on the configuration information of a previously configured source server. the configuration information of the previously configured source server is copied and exported to an xml file, which is then imported to the target server.


Clonemaker, английский
    Производитель клонов (пк)


Phish(ing), английский
  1. An e-mail or website designed to redirect you to a bogus website with the intention of gaining bank or credit card information, or to download malicious program onto a computer without the users knowledge.

  2. The technique is also often used to secure credit card numbers, bank account information, brokerage information, and generally anything that could yield a financial gain in line with fraud operations.


Phisher, английский
    A malicious user who deceives people into revealing personal information, such as account passwords and credit card numbers. a phisher typically uses deceptive email messages or online advertisements as bait to lure unsuspecting users to fraudulent websites, where the users are then tricked into providing personal information.


Phishing, английский
  1. A technique used to trick computer users into revealing personal or financial information. a common online phishing scam starts with an e-mail message that appears to come from a trusted source but actually directs recipients to provide information to a fraudulent web site. phishing

  2. A social engineering technique in which the attacker masquerades as a legitimate website or communication in order to acquire sensitive information, such as passwords or credit card information. phishing messages can arrive via email, sms, tweets, instant messages, qr codes, or social media status updates. phishing emails are also used as a delivery method for ransomware that exhorts users to click on an attachment or url where malicious code encrypts their files in a matter of seconds. there are a number of techniques which can be used to help identify whether a suspicious email is a phishing attempt, such as examining the email headers, but there is no silver bullet. one of the safest ways to check the authenticity of a suspicious email is to contact the sender by phoning them – an old-fashioned solution to a modern problem.


Phishing confidence level, английский
    A value between 1 and 8 that is assigned to a message based on its content and that reflects the liklihood that the message is phishing.


Phishing filter, английский
    A filter that helps to identify fraudulent web sites and protect against personal data theft.


Phishing susceptibility framework, английский
    Framework that correlates user attributes, such as culture, age, gender and experiential factors (technology savviness and professional experience), to phishing attack susceptibility.


Phishing website, английский
    A web site that impersonates a trustworthy web site to obtain user’s personal or financial information. phone (n)


Institution, английский
  1. A place where people are cared for, e.g. a hospital or clinic, especially a psychiatric hospital or children’s home

  2. An establishment founded partly with a view to instruction; as the royal united service institution in london.

  3. The term can take on a number of meanings. it can be an organization which is in the business of holding assets (such as banks, insurance companies, and investment companies). it can also apply to traditions or procedures, as in those associated with a regulatory commission. also, see institutional factors.

  4. A structure, a mechanism of social order or cooperation, which governs the behaviour of a group of individuals within a human annex i glossary, acronyms, chemical symbols and prefi xes community. institutions are intended to be functionally relevant for an extended period, able to help transcend individual interests and help govern cooperative human behaviour. the term can be extended to also cover regulations, technology standards, certifi cation and the like.


Credential harvesting, английский
    Occurs when the login credentials for webmail, domain access, vpn access, etc. are collected via a compromised web browser, application, malware or dns server. this can have serious ramifications for an organisation’s security as these login credentials give the attacker the keys to the kingdom, and this type of attack is very difficult to detect.


Clickjacking, английский
    Occurs when an attacker tricks the target into clicking on something different to what they had expected. this can potentially reveal sensitive information, take control of their computer, or cause them to take an action that was not intended.