Gaois

This is a static copy of data that is exported from IATE on an occasional basis. It should not be assumed that information provided about an entry here will always correspond to the current version of the entry in IATE. That current version can be checked by clicking on the link on the upper right hand side of each entry. More information »

2 results

  1. EDUCATION AND COMMUNICATIONS|information technology and data processing · EDUCATION AND COMMUNICATIONS|communications|communications systems · EUROPEAN UNION|European construction|European Union|area of freedom, security and justice
    haiceáil Reference Faomhadh an téarma seo mar chuid de Thionscadal Lex
    ga
    Hacking | Hacken | Computerhacking
    de
    Definition eine Form des aktiven, unerlaubten Eindringens in Computersoftware und Datenbestände Reference "vgl. Bundeszentrale f. polit. Bildung (DE), ""Cyber-Terror"": Risiken im Informationszeitalter (10.12.2020)"
    Comment """die gefährlicheren Varianten haben zum Ziel, Informationen zu erlangen, zu manipulieren oder zu zerstören bis hin zum Funktionszusammenbruch von Großsystemen"" (bpb)XREF: HackerOberbegriff: Cyberkriminalität"
    hacking | cracking | malicious hacking
    en
    Definition act of breaking into a computer system without authorisation and generally for malicious purposes Reference "Council-EN, based on Council-FR and Wikipedia hacker definition controversy (4.12.2020)"
    Comment "In the context of cybercrime, hacking is an umbrella term that applies to a variety of human activities that interfere with the proper operation of computer systems and networks. Most legal systems, however, do not use the term hacking due to its ambiguity. A list of more specific hacking behaviours is criminalised instead.Reference: 'Youth Pathways into Cybercrime', October 2016 Europol > Publications and Documents https://www.europol.europa.eu/publications-documents/youth-pathways-cybercrime [29.01.2019]In view of the primary, negative connotations of the term ""hacking"" (see Language Usage note below) it should not to be confused with ""ethical hacking"" [ IATE:283961 ].Hacking uses various techniques and methods including: phishing IATE:933881 ; rootkits IATE:2242278 ; Trojan horse IATE:795390 ; computer viruses IATE:898254 ; computer worms IATE:919096 ; and keyloggers IATE:3516463 ."
    piratage | piratage informatique | attaque pirate
    fr
    Definition accès à un système informatique sans autorisation, le plus souvent dans un but malveillant (accéder à des informations confidentielles ou encore altérer ou endommager les systèmes et les données qu'elles peuvent comporter) Reference "Conseil-FR, d'après le site de la Sûreté du Québec, ""Prévention"" (9.12.2020)"
    Comment "Différentes formes et techniques: le hameçonnage, le rootkit, l'ingénierie sociale, les chevaux de Troie, les virus, les vers, les enregistreurs de frappe, etc."
  2. LAW|criminal law|offence · PRODUCTION, TECHNOLOGY AND RESEARCH|technology and technical regulations|technology · INDUSTRY|electronics and electrical engineering|electronics industry
    haiceáil cairr Reference Faomhadh an téarma seo mar chuid de Thionscadal Lex
    ga
    Auto-Hacking
    de
    Definition Fremd-Fernsteuerung eines Autos Reference Council-DE
    Comment Voraussetzung für die Manipulation von Fahrzeugfunktionen aus der Ferne ist, dass es Hackern gelingt, über eine drahtlose Verbindung in das Steuerungszentrum des Autos einzudringen
    car hacking
    en
    Definition taking control of a car remotely by hacking into its automation systems Reference "Based on: ""Car hacking: Poor security in new cars puts drivers at risk, researchers say"", ABC News, 16/9/2014, http://www.abc.net.au/news/2014-09-16/car-hacking-poor-security-in-new-cars-puts-drivers-at-risk/5748274 ; Vehicular automation, http://en.wikipedia.org/wiki/Vehicular_automation (26.3.2015)"
    piratage de voiture
    fr
    Definition prise de contrôle non autorisée des systèmes électroniques d'une voiture Reference "Conseil-FR, d'après ""Pirater une voiture? C'est possible…"", Le Monde, 4.3.2014, http://www.lemonde.fr/economie/article/2014/03/04/pirater-une-voiture-c-est-possible_4377167_3234.html [13.5.2015]"