English | German |
brute force attack | Brute-Force-Angriff (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
denial of service attack | Denial-of-Service-Angriff (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
denial-of-service attack | Denial-of-Service-Angriff (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
dictionary attack | Wörterbuchangriff (A method of guessing a user's password or PIN by trying every word in the dictionary until successful) |
directory harvest attack | Verzeichnisdiebstahl-Angriff (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database) |
flood attack | Flutangriff (" A denial-of-service attack in which a server is "flooded" with requests that cannot be completed. Once flooded, the host can no longer respond to legitimate requests.") |
flood attack mitigation | Flutabwehr (A configuration setting used by ISA Server to prevent various flood attacks) |
hammering attack | Hammering-Angriff (A key search attack in which an unauthorized user guesses at a PIN or password many times) |
insider attack | Insiderangriff (An attack originating from inside a protected network) |
key search attack | Angriff durch Schlüsselsuche (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
land attack | Landungsangriff (A denial-of-service attack (DoS) in which the attacker opens a legitimate TCP session with a spoofed source IP address and port number that match the IP address and port number of the targeted computer so that the targeted computer will try to establish a TCP session with itself, causing some TCP implementations to go into a loop and the computer to fail) |
luring attack | Lockangriff (An attack in which the client is lured to voluntarily connect to the attacker) |
script injection attack | Angriff durch Skripteinschleusung (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code) |
SQL injection attack | Angriff durch Einschleusung von SQL-Befehlen (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application) |
Time Attack Mode | Zeitspiel (A menu item on the Purble Place menu that allows the user to select a timed mode for their game) |
Trojan denial of service attack | DoS-Trojaner (A type of Trojan that creates a denial of service attack) |