feasible attack

feasible attack
возможное (вероятное) нападение

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужно сделать НИР?

Смотреть что такое "feasible attack" в других словарях:

  • Attack Vector: Tactical — Cover Art Designer(s) Ken Burnside, Eric Finley, Tony Valle Publisher(s) Ad Astra Games Players …   Wikipedia

  • Chosen-plaintext attack — A chosen plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker has the capability to choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts. The goal of the attack is to gain… …   Wikipedia

  • Related-key attack — In cryptography, a related key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the… …   Wikipedia

  • man in the middle attack — n. A computer security breach in which a malicious user intercepts and possibly alters data traveling along a network. (Also: man in the middle attack.) Example Citation: If it delivers what s promised, Funk s Odyssey software will let… …   New words

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • ECONOMIC AFFAIRS — THE PRE MANDATE (LATE OTTOMAN) PERIOD Geography and Borders In September 1923 a new political entity was formally recognized by the international community. Palestine, or Ereẓ Israel as Jews have continued to refer to it for 2,000 years,… …   Encyclopedia of Judaism

  • Viet Cong and PAVN battle tactics — Soldier of a NLF/Viet Cong Main Force Unit. They shared common arms, procedures, tactics, organization and personnel with PAVN. Viet Cong and PAVN battle tactics comprised a flexible mix of guerrilla and conventional warfare battle tactics used… …   Wikipedia

  • Military use of children — A Chinese Nationalist soldier, age 10, member of a Chinese division from the X Force, boarding planes in Burma bound for China, May 1944. The military use of children takes three distinct forms: children can take direct part in hostilities (child …   Wikipedia

  • Korean People's Air Force — 조선인민군 공군 Korean People s Army Air Force KPAAF Flag Founded 20 August 1947 Country …   Wikipedia

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»