Глоссарий





Новости переводов

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text

20 ноября, 2023

Chatbot machine learning language service



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Out of band (oob) authentication

Глоссарий терминов по социальной инженерии и информационной безопасности
    The use of a separate communication channel, such as an email, telephone, or in-person request, to verify the veracity of a request. this is considered to be a type of two-factor authentication. many high-profile phishing and cyber-attacks on organisations might have been averted if employees had been trained to use oob authentication.




Communication, английский
  1. Связь; связной

  2. (кан.) решение экспертизы

  3. N коммуни- кация; процесс передачи информации; mis~ недопонимание, непонимание | attr. комму- никативный disorder, impairment, strategy cross-cultural (intercultural) ~ межкультурная коммуникация non-verbal ~ невербальная, неречевая комму- никация verbal ~ вербальная, речевая коммуникация

  4. Передача (распространение) информации процесс информирования населения.

  5. Corresponding by letter, hail, or signal. (see line of communication and boyaux.)

  6. Loosely, the transmission of structure across systems differentiated in time and in space, the process by which one mind affects another, interaction mediated by signals, symbols or messages. more formally and in cybernetics, communication is that construct an observer requires when he cannot take a dynamic system apart without loss (->ana~ysis), yet wants to distinguish, understand and say something about that system`s parts, variables or members, or alternatively, when he wants to explain the behavior of anyone of its parts yet cannot accomplish this adequately without reference to other parts of the system. communication ~s what integrates and distinguishes the participation of individuals in such wholes as groups, communities, societies. a more detailed analysis of communication processes reveals that they involve patterns that convey information, are subjected to numerous constraints and are describable in terms of transformations, including encoding, decoding, (->coding), transmission, and distortions due to the characteristics of a channel. historically, communication. was thought of as a binary relation between a sender and a receiver. modern conceptions of communication include complex networks possibly with feedback loops having the effect of memory, coordination, and coorientation and exhibiting dynamic properties not manifest in, and explainable by, reference to the properties of the.communicators involved (->constructivism). communications (plural


Authentication, английский
  1. In the context of bonds, refers to the validation of a bond certificate.

  2. Мера безопасности, использующая стандарт шифрования данных (des), направленная на то, чтобы передача и сообщение edi не были подделаны или изменены.

  3. A communications procedure designed to confirm genuine signals, and hence identify spurious ones. automated mutual-assistance vessel rescue: a u.s. coast guard system that coordinates ocean search and rescue efforts. based on a worldwide plot of merchant vessel locations. at 30

  4. Проверка подлинности; проверка прав доступа; удостоверение; аутентификация; идентификация; опознавание; отождествление; подтверждение права на доступ; предъявление полномочий

  5. A workflow that is used to perform additional user identity validation before continuing with the request.

  6. The process of verifying the identity of a user, computer, device, process, or other entity by validating the credentials provided by the entity. common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords.

  7. Опознание


Pass the hash, английский
    Many users erroneously believe that hashed passwords stored in their internet browser cannot be used in attacks. in reality, however, attackers can use what are known as “hash dumping tools” which collect hashed passwords from a target (windows) system. these can then be stored in the local authority subsystem service, which dupes the windows system into thinking the attacker is an authenticated user.


Open source intelligence techniques (osint), английский
    The practice of using publicly available information found in sources, such as google, linkedin, twitter, whois and facebook, to glean intelligence on an individual. using such sources has made it easy for social engineers to assemble an accurate profile of targets, which they will use in highly targeted attacks. cyber-awareness training should make employees aware of how bad actors use such information and how they can minimise their exposure to the risk.