DictionaryForumContacts

Terms containing attacks | all forms
SubjectEnglishKorean
ITattack mechanism공격 메커니즘
math.attack rate발병률
ITattack vector공격 경로
ITbrute force attack무차별 대입 공격
comp., MSbrute force attack무차별 암호 대입 공격brute force attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
comp., MSbucket brigade attack메시지 가로채기bucket brigade 공격 (A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack the users are unaware that there is an attacker between them intercepting and modifying their data)
comp., MSdenial of service attack서비스 거부 공격 (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
ITdenial-of-service attack DoS서비스거부공격
comp., MSdenial-of-service attack서비스 거부 공격 (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
comp., MSdictionary attack사전 공격Dictionary Attack (A method of guessing a user's password or PIN by trying every word in the dictionary until successful)
comp., MSdirectory harvest attack디렉터리 수집 공격 (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database)
ITdistributed denial-of-service attack DDoS분산 서비스 거부DDoS 공격
comp., MSflood attack서비스 장애 공격 (" A denial-of-service attack in which a server is "flooded" with requests that cannot be completed. Once flooded, the host can no longer respond to legitimate requests.")
comp., MSflood attack mitigation서비스 장애 공격 완화 (A configuration setting used by ISA Server to prevent various flood attacks)
comp., MSinference attack유추 공격 (A type of security threat in which a malicious user is able to derive the value of data without actually accessing it, for example by monitoring the response time to a query)
comp., MSkey search attack무차별 키 대입 공격key search attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
comp., MSland attack랜드 공격 (A denial-of-service attack (DoS) in which the attacker opens a legitimate TCP session with a spoofed source IP address and port number that match the IP address and port number of the targeted computer so that the targeted computer will try to establish a TCP session with itself, causing some TCP implementations to go into a loop and the computer to fail)
comp., MSluring attack유인 공격 (An attack in which the client is lured to voluntarily connect to the attacker)
ITman-in-the-middle attack맨 인 더 미들MITM 공격
comp., MSman-in-the-middle attack메시지 가로채기man-in-the-middle 공격 (A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack the users are unaware that there is an attacker between them intercepting and modifying their data)
ITminiature fragment attack파편화 패킷 공격
ITreturn-oriented attacks반환 지향형 공격
comp., MSscript injection attack스크립트 삽입 공격 (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code)
comp., MSSQL injection attackSQL 삽입 공격 (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application)
comp., MSTime Attack Mode시간 제한 모드 (A menu item on the Purble Place menu that allows the user to select a timed mode for their game)

Get short URL