eavesdropping attack

eavesdropping attack
eavesdropping attack NRT Lauschangriff m

English-German dictionary of Electrical Engineering and Electronics. 2013.

Игры ⚽ Поможем написать курсовую

Schlagen Sie auch in anderen Wörterbüchern nach:

  • Eavesdropping — is the act of surreptitiously listening to a private conversation. This is commonly thought to be unethical and there is an old adage that eavesdroppers seldom hear anything good of themselves .citation|url=http://books.google.co.uk/books?id=7TNlF… …   Wikipedia

  • Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent …   Wikipedia

  • Passive attack — A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext). This can also include known plaintext… …   Wikipedia

  • Replay attack — A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it,… …   Wikipedia

  • man in the middle attack — n. A computer security breach in which a malicious user intercepts and possibly alters data traveling along a network. (Also: man in the middle attack.) Example Citation: If it delivers what s promised, Funk s Odyssey software will let… …   New words

  • KeeLoq — is a proprietary hardware dedicated NLFSR based block cipher. The uni directional command transfer protocol was designed by Frederick Bruwer PhD, CEO at Nanoteq (Pty) Ltd and the crypto algorithm was done by Professor Gideon Kuhn with the silicon …   Wikipedia

  • No cloning theorem — The no cloning theorem is a result of quantum mechanics which forbids the creation of identical copies of an arbitrary unknown quantum state. It was stated by Wootters, Zurek, and Dieks in 1982, and has profound implications in quantum computing… …   Wikipedia

  • Fortify Software — is a San Mateo, California based software vendor. The company was founded in 2003 and provides software security products that identify and remove security vulnerabilities from software applications throughout the development, testing, and… …   Wikipedia

  • No-cloning theorem — Quantum mechanics Uncertainty principle …   Wikipedia

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • NSA warrantless surveillance controversy — For the related controversy about data mining of domestic call records see NSA call database. National Security Agency logo The NSA warrantless surveillance controversy (AKA Warrantless Wiretapping ) concerns surveillance of persons within the… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”