Subject | English | Korean |
IT | attack mechanism | 공격 메커니즘 |
math. | attack rate | 발병률 |
IT | attack vector | 공격 경로 |
IT | brute force attack | 무차별 대입 공격 |
comp., MS | brute force attack | 무차별 암호 대입 공격brute force attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
comp., MS | bucket brigade attack | 메시지 가로채기bucket brigade 공격 (A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack the users are unaware that there is an attacker between them intercepting and modifying their data) |
comp., MS | denial of service attack | 서비스 거부 공격 (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
IT | denial-of-service attack DoS | 서비스거부공격 |
comp., MS | denial-of-service attack | 서비스 거부 공격 (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
comp., MS | dictionary attack | 사전 공격Dictionary Attack (A method of guessing a user's password or PIN by trying every word in the dictionary until successful) |
comp., MS | directory harvest attack | 디렉터리 수집 공격 (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database) |
IT | distributed denial-of-service attack DDoS | 분산 서비스 거부DDoS 공격 |
comp., MS | flood attack | 서비스 장애 공격 (" A denial-of-service attack in which a server is "flooded" with requests that cannot be completed. Once flooded, the host can no longer respond to legitimate requests.") |
comp., MS | flood attack mitigation | 서비스 장애 공격 완화 (A configuration setting used by ISA Server to prevent various flood attacks) |
comp., MS | inference attack | 유추 공격 (A type of security threat in which a malicious user is able to derive the value of data without actually accessing it, for example by monitoring the response time to a query) |
comp., MS | key search attack | 무차별 키 대입 공격key search attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
comp., MS | land attack | 랜드 공격 (A denial-of-service attack (DoS) in which the attacker opens a legitimate TCP session with a spoofed source IP address and port number that match the IP address and port number of the targeted computer so that the targeted computer will try to establish a TCP session with itself, causing some TCP implementations to go into a loop and the computer to fail) |
comp., MS | luring attack | 유인 공격 (An attack in which the client is lured to voluntarily connect to the attacker) |
IT | man-in-the-middle attack | 맨 인 더 미들MITM 공격 |
comp., MS | man-in-the-middle attack | 메시지 가로채기man-in-the-middle 공격 (A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack the users are unaware that there is an attacker between them intercepting and modifying their data) |
IT | miniature fragment attack | 파편화 패킷 공격 |
IT | return-oriented attacks | 반환 지향형 공격 |
comp., MS | script injection attack | 스크립트 삽입 공격 (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code) |
comp., MS | SQL injection attack | SQL 삽입 공격 (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application) |
comp., MS | Time Attack Mode | 시간 제한 모드 (A menu item on the Purble Place menu that allows the user to select a timed mode for their game) |