- eavesdropping attack
- eavesdropping attack NRT Lauschangriff m
English-German dictionary of Electrical Engineering and Electronics. 2013.
English-German dictionary of Electrical Engineering and Electronics. 2013.
Eavesdropping — is the act of surreptitiously listening to a private conversation. This is commonly thought to be unethical and there is an old adage that eavesdroppers seldom hear anything good of themselves .citation|url=http://books.google.co.uk/books?id=7TNlF… … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
Passive attack — A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext). This can also include known plaintext… … Wikipedia
Replay attack — A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it,… … Wikipedia
man in the middle attack — n. A computer security breach in which a malicious user intercepts and possibly alters data traveling along a network. (Also: man in the middle attack.) Example Citation: If it delivers what s promised, Funk s Odyssey software will let… … New words
KeeLoq — is a proprietary hardware dedicated NLFSR based block cipher. The uni directional command transfer protocol was designed by Frederick Bruwer PhD, CEO at Nanoteq (Pty) Ltd and the crypto algorithm was done by Professor Gideon Kuhn with the silicon … Wikipedia
No cloning theorem — The no cloning theorem is a result of quantum mechanics which forbids the creation of identical copies of an arbitrary unknown quantum state. It was stated by Wootters, Zurek, and Dieks in 1982, and has profound implications in quantum computing… … Wikipedia
Fortify Software — is a San Mateo, California based software vendor. The company was founded in 2003 and provides software security products that identify and remove security vulnerabilities from software applications throughout the development, testing, and… … Wikipedia
No-cloning theorem — Quantum mechanics Uncertainty principle … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
NSA warrantless surveillance controversy — For the related controversy about data mining of domestic call records see NSA call database. National Security Agency logo The NSA warrantless surveillance controversy (AKA Warrantless Wiretapping ) concerns surveillance of persons within the… … Wikipedia