interception vulnerability

interception vulnerability
уязвимость к перехвату

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужно сделать НИР?

Смотреть что такое "interception vulnerability" в других словарях:

  • Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… …   Wikipedia

  • Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …   Wikipedia

  • Dan Kaminsky — Kaminsky in 2007. Occupation Computer security researcher Known for Discovering the 2008 DNS cache poisoning vulnerability Dan Kam …   Wikipedia

  • Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the …   Wikipedia

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • The Blitz — London Blitz redirects here. For the London based American football team, see London Blitz (American football). For other uses, see Blitz (disambiguation). The Blitz Part of Second World War, Home Front …   Wikipedia

  • Intelligence cycle security — This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy. National intelligence programs,… …   Wikipedia

  • Supermarine Spitfire operational history — November 1942 photo of a very early Mk IXb of 306 (Polish) Toruński Squadron. Main article: Supermarine Spitfire The Supermarine Spitfire, the only British fighter to be manufactured before, during and after the Second World War, was designed as… …   Wikipedia

  • Opérations de l'Axe dans les eaux australiennes — Article principal : Histoire militaire de l Australie pendant la Seconde Guerre mondiale. Affiche de propagande appelant les Australiens à venger le naufrage du navire hôpital Centaur coulé par le sous marin japonais Seconde Guerre mondiale …   Wikipédia en Français

  • Counter-terrorism — Terrorism Definitions · Counter terrorism International conventions Anti terrorism legislation Terrorism insurance …   Wikipedia

  • Strategic Defense Initiative — Organization SDIO Agency overview Formed 1984 Dissolved 1993 (renamed) Superseding a …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»