spoofing of user identity

spoofing of user identity
Вычислительная техника: подмена идентификатора пользователя

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "spoofing of user identity" в других словарях:

  • Spoofing attack — In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Man in the middle attack and internet… …   Wikipedia

  • User agent — A user agent is the client application used with a particular network protocol; the phrase is most commonly used in reference to those which access the World Wide Web, but other systems such as SIP use the term user agent to refer to the user s… …   Wikipedia

  • Subscriber Identity Module — Simcard redirects here. For the brand name medication, see Simvastatin. A typical SIM Card …   Wikipedia

  • Central Equipment Identity Register — The Central Equipment Identity Register is a database of the IMEI numbers of blacklisted handsets. If a device s IMEI number is listed on CEIR, it is not supposed to work on any service provider. A common usage of the CEIR is with stolen… …   Wikipedia

  • IP address spoofing — In computer networking, the term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing… …   Wikipedia

  • Web spoofing — faking an Internet address in order to assume a user s identity and get access to other users data; satirical description of a web site …   English contemporary dictionary

  • Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… …   Wikipedia

  • STRIDE (security) — STRIDE is a system for classifying computer security threats used at Microsoft. It provides a mnemonic for security threats in six categories. The threat categories are:* Spoofing of user identity * Tampering * Repudiation * Information… …   Wikipedia

  • IP Multimedia Subsystem — The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem (IMS) is an architectural framework for delivering Internet Protocol (IP) multimedia services. It was originally designed by the wireless standards body 3rd Generation… …   Wikipedia

  • Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»