- spoofing of user identity
- Вычислительная техника: подмена идентификатора пользователя
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Spoofing attack — In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Man in the middle attack and internet… … Wikipedia
User agent — A user agent is the client application used with a particular network protocol; the phrase is most commonly used in reference to those which access the World Wide Web, but other systems such as SIP use the term user agent to refer to the user s… … Wikipedia
Subscriber Identity Module — Simcard redirects here. For the brand name medication, see Simvastatin. A typical SIM Card … Wikipedia
Central Equipment Identity Register — The Central Equipment Identity Register is a database of the IMEI numbers of blacklisted handsets. If a device s IMEI number is listed on CEIR, it is not supposed to work on any service provider. A common usage of the CEIR is with stolen… … Wikipedia
IP address spoofing — In computer networking, the term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing… … Wikipedia
Web spoofing — faking an Internet address in order to assume a user s identity and get access to other users data; satirical description of a web site … English contemporary dictionary
Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… … Wikipedia
STRIDE (security) — STRIDE is a system for classifying computer security threats used at Microsoft. It provides a mnemonic for security threats in six categories. The threat categories are:* Spoofing of user identity * Tampering * Repudiation * Information… … Wikipedia
IP Multimedia Subsystem — The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem (IMS) is an architectural framework for delivering Internet Protocol (IP) multimedia services. It was originally designed by the wireless standards body 3rd Generation… … Wikipedia
Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia