Gaois

This is a static copy of data that is exported from IATE on an occasional basis. It should not be assumed that information provided about an entry here will always correspond to the current version of the entry in IATE. That current version can be checked by clicking on the link on the upper right hand side of each entry. More information »

1 result

  1. LAW|criminal law · EDUCATION AND COMMUNICATIONS|information technology and data processing
    ionsaí pasfhocail Reference Faomhadh an téarma seo mar chuid de Thionscadal Lex
    ga
    Passwort-Angriff
    de
    password attack
    en
    Definition "cyber-attack [ IATE:919510 ] where a third party intruder tries to gain access to an entity's computer systems by cracking a user password" Reference "COM-EN based on: -UK Cyber Security Association > What is a password attack?, https://cybersecurityassociation.co.uk/common-attacks/password-attack-advice/ [13.4.2018] - Identity > Common Cyber Attacks Your Business Should Try To Avoid, Part One, https://identitycard.com/blog/common-cyber-attacks-your-business-should-try-to-avoid-part-one [13.4.2018]"
    Comment This type of attack doesn’t normally require any type of malicious code or software to gain access to your personal information. If a cyber hacker is using a program to access your account passwords, they are likely running the software on their computer system, rather than yours. Most hackers will attempt to steal your password information through brute force attacks. These are trial-and-error methods that will automatically generate a large number of consecutive guesses before they find the desired data they need. These types of cyber attacks can be used to crack encrypted data as well. How can I prevent it? Strong passwords are really the only way to safeguard against password attacks. This means using a combination of upper and lower case letters, symbols and numbers and having at least eight characters or more.
    attaque sur les mots de passe | attaque de mot de passe
    fr
    Definition méthode de piratage permettant, en essayant diverses combinaisons, de trouver le mot de passe d’un réseau ou d’un ordinateur Reference "Site La Presse+, article de Karim Benessaieh, «Cybersécurité - petit dictionnaire de la piraterie» (4.11.2019)"