German | English |
Angriff durch Einschleusung von SQL-Befehlen | SQL injection attack (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application) |
Angriff durch Schlüsselsuche | key search attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
Angriff durch Skripteinschleusung | script injection attack (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code) |
Brute-Force-Angriff | brute force attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
Denial-of-Service-Angriff | denial-of-service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
Denial-of-Service-Angriff | denial of service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
DoS-Angriff | DoS (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
Hammering-Angriff | hammering attack (A key search attack in which an unauthorized user guesses at a PIN or password many times) |
Schutz vor IPSec-Denial-of-Service-Angriffen | IPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
Verzeichnisdiebstahl-Angriff | directory harvest attack (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database) |