- feasible attack
- возможное (вероятное) нападение
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Attack Vector: Tactical — Cover Art Designer(s) Ken Burnside, Eric Finley, Tony Valle Publisher(s) Ad Astra Games Players … Wikipedia
Chosen-plaintext attack — A chosen plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker has the capability to choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts. The goal of the attack is to gain… … Wikipedia
Related-key attack — In cryptography, a related key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the… … Wikipedia
man in the middle attack — n. A computer security breach in which a malicious user intercepts and possibly alters data traveling along a network. (Also: man in the middle attack.) Example Citation: If it delivers what s promised, Funk s Odyssey software will let… … New words
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
ECONOMIC AFFAIRS — THE PRE MANDATE (LATE OTTOMAN) PERIOD Geography and Borders In September 1923 a new political entity was formally recognized by the international community. Palestine, or Ereẓ Israel as Jews have continued to refer to it for 2,000 years,… … Encyclopedia of Judaism
Viet Cong and PAVN battle tactics — Soldier of a NLF/Viet Cong Main Force Unit. They shared common arms, procedures, tactics, organization and personnel with PAVN. Viet Cong and PAVN battle tactics comprised a flexible mix of guerrilla and conventional warfare battle tactics used… … Wikipedia
Military use of children — A Chinese Nationalist soldier, age 10, member of a Chinese division from the X Force, boarding planes in Burma bound for China, May 1944. The military use of children takes three distinct forms: children can take direct part in hostilities (child … Wikipedia
Korean People's Air Force — 조선인민군 공군 Korean People s Army Air Force KPAAF Flag Founded 20 August 1947 Country … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium