Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Multi-factor authentication (mfa)

Глоссарий терминов по социальной инженерии и информационной безопасности
    Passwords have an inherent weakness as they can be stolen, guessed or brute-forced. as a result, hardware manufacturers and software providers decided this more secure authentication solution was needed. with multi-factor authentication, the user must authenticate by using two or more separate forms of identification. the classic example of multi-factor authentication in action is a bank customer having to use a card and a pin to withdraw money from an atm. having just one “factor” will result in the authentication process failing and the customer being unable to withdraw cash. multi-factor authentication can also be applied to email services, such as gmail, and cloud storage providers, such as dropbox. once enabled, the user needs a secondary code (typically sent to a smartphone) or a hardware token to login. this helps to thwart attackers with stolen passwords from logging into a multi-factor secured account. multi-factor authentication is also commonly referred to as two-factor (2fa) authentication.




Authentication, английский
  1. In the context of bonds, refers to the validation of a bond certificate.

  2. Мера безопасности, использующая стандарт шифрования данных (des), направленная на то, чтобы передача и сообщение edi не были подделаны или изменены.

  3. A communications procedure designed to confirm genuine signals, and hence identify spurious ones. automated mutual-assistance vessel rescue: a u.s. coast guard system that coordinates ocean search and rescue efforts. based on a worldwide plot of merchant vessel locations. at 30

  4. Проверка подлинности; проверка прав доступа; удостоверение; аутентификация; идентификация; опознавание; отождествление; подтверждение права на доступ; предъявление полномочий

  5. A workflow that is used to perform additional user identity validation before continuing with the request.

  6. The process of verifying the identity of a user, computer, device, process, or other entity by validating the credentials provided by the entity. common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords.

  7. Опознание


Authenticate, английский
  1. When records or accounts are looked at to check that they are right and complete

  2. Аутентифицировать; опознавать; устанавливать подлинность


Identification, английский
  1. Identification is the association of a particular record within a set of data with a particular population unit.

  2. Опознавание

  3. Идентификация; отбор необходимой информации для обработки; выбор массивов (документы оон)

  4. The act of discovering or stating who someone is or what something is  identification with someone the act of associating with and unconsciously taking on the viewpoints and behaviours of one or more other people

  5. Идентификация определение, установление возбудителя.

  6. The correspondence between a largely behavioral model and the portion of reality it claims to represent. one can think of such models as having equations whose parameters must be chosen in order for the model to be specified. a parameter can either be assumed to have a certain value and is then hypothesized or it can be estimated (->estimation) from given data and is then said to be identified. a model may be under-identified when not all of its parameters are identified or it may be over-identified when there are two or more inconsistent estimates of a parameter.

  7. A unique identifier of an object or person.

  8. Proof or evidence that supports an identity claim.

  9. The process of mapping an object onto the supported identification schemas or getting the unique user identifier (uid). the operating system, iis, or commerce server usually provides this identification.

  10. Установление личности клиента


Smartphone, английский
  1. A computer in a cellphone. as well as a phone, typically it will include both stills and movie cameras, music player, enough computing power to run sophisticated programs such as office sofware and games, satellite navigation, and gigabytes of storage. the most famous is apple’s- iphone, but all the major manufacturers make them and they are where the it industry is mostly focussed at the moment. some think that they will completely replace most personal computers.

  2. A wireless, mobile device that combines platform software, a browser, a modern chipset, and a telephone handset.


Open source intelligence techniques (osint), английский
    The practice of using publicly available information found in sources, such as google, linkedin, twitter, whois and facebook, to glean intelligence on an individual. using such sources has made it easy for social engineers to assemble an accurate profile of targets, which they will use in highly targeted attacks. cyber-awareness training should make employees aware of how bad actors use such information and how they can minimise their exposure to the risk.


Mis-direction, английский
    The act of deliberately drawing a target’s attention to one thing in order to distract them from another. this is often used in social engineering attacks.