Gaois

This is a static copy of data that is exported from IATE on an occasional basis. It should not be assumed that information provided about an entry here will always correspond to the current version of the entry in IATE. That current version can be checked by clicking on the link on the upper right hand side of each entry. More information »

5 results

  1. EDUCATION AND COMMUNICATIONS|information technology and data processing · EDUCATION AND COMMUNICATIONS|communications|communications systems · EUROPEAN UNION|European construction|European Union|area of freedom, security and justice
    haiceáil Reference Faomhadh an téarma seo mar chuid de Thionscadal Lex
    ga
    Hacking | Hacken | Computerhacking
    de
    Definition eine Form des aktiven, unerlaubten Eindringens in Computersoftware und Datenbestände Reference "vgl. Bundeszentrale f. polit. Bildung (DE), ""Cyber-Terror"": Risiken im Informationszeitalter (10.12.2020)"
    Comment """die gefährlicheren Varianten haben zum Ziel, Informationen zu erlangen, zu manipulieren oder zu zerstören bis hin zum Funktionszusammenbruch von Großsystemen"" (bpb)XREF: HackerOberbegriff: Cyberkriminalität"
    hacking | cracking | malicious hacking
    en
    Definition act of breaking into a computer system without authorisation and generally for malicious purposes Reference "Council-EN, based on Council-FR and Wikipedia hacker definition controversy (4.12.2020)"
    Comment "In the context of cybercrime, hacking is an umbrella term that applies to a variety of human activities that interfere with the proper operation of computer systems and networks. Most legal systems, however, do not use the term hacking due to its ambiguity. A list of more specific hacking behaviours is criminalised instead.Reference: 'Youth Pathways into Cybercrime', October 2016 Europol > Publications and Documents https://www.europol.europa.eu/publications-documents/youth-pathways-cybercrime [29.01.2019]In view of the primary, negative connotations of the term ""hacking"" (see Language Usage note below) it should not to be confused with ""ethical hacking"" [ IATE:283961 ].Hacking uses various techniques and methods including: phishing IATE:933881 ; rootkits IATE:2242278 ; Trojan horse IATE:795390 ; computer viruses IATE:898254 ; computer worms IATE:919096 ; and keyloggers IATE:3516463 ."
    piratage | piratage informatique | attaque pirate
    fr
    Definition accès à un système informatique sans autorisation, le plus souvent dans un but malveillant (accéder à des informations confidentielles ou encore altérer ou endommager les systèmes et les données qu'elles peuvent comporter) Reference "Conseil-FR, d'après le site de la Sûreté du Québec, ""Prévention"" (9.12.2020)"
    Comment "Différentes formes et techniques: le hameçonnage, le rootkit, l'ingénierie sociale, les chevaux de Troie, les virus, les vers, les enregistreurs de frappe, etc."
  2. LAW|criminal law|offence · PRODUCTION, TECHNOLOGY AND RESEARCH|technology and technical regulations|technology · INDUSTRY|electronics and electrical engineering|electronics industry
    haiceáil cairr Reference Faomhadh an téarma seo mar chuid de Thionscadal Lex
    ga
    Auto-Hacking
    de
    Definition Fremd-Fernsteuerung eines Autos Reference Council-DE
    Comment Voraussetzung für die Manipulation von Fahrzeugfunktionen aus der Ferne ist, dass es Hackern gelingt, über eine drahtlose Verbindung in das Steuerungszentrum des Autos einzudringen
    car hacking
    en
    Definition taking control of a car remotely by hacking into its automation systems Reference "Based on: ""Car hacking: Poor security in new cars puts drivers at risk, researchers say"", ABC News, 16/9/2014, http://www.abc.net.au/news/2014-09-16/car-hacking-poor-security-in-new-cars-puts-drivers-at-risk/5748274 ; Vehicular automation, http://en.wikipedia.org/wiki/Vehicular_automation (26.3.2015)"
    piratage de voiture
    fr
    Definition prise de contrôle non autorisée des systèmes électroniques d'une voiture Reference "Conseil-FR, d'après ""Pirater une voiture? C'est possible…"", Le Monde, 4.3.2014, http://www.lemonde.fr/economie/article/2014/03/04/pirater-une-voiture-c-est-possible_4377167_3234.html [13.5.2015]"
  3. LAW|criminal law · EDUCATION AND COMMUNICATIONS|information technology and data processing
    haiceáil chúise Reference "Faofa ag an gCoiste Téarmaíochta, www.tearma.ieFaomhadh an téarma seo mar chuid de Thionscadal Lex"
    ga
    Context 'Agus fás tagtha ar réimse an TFC, tá raon bagairtí nua tagtha chun cinn agus iad ag bagairt ar oibriú slán líonraí TFC (mar haiceáil, cibearchoireacht, haiceáil chúise cibear-spiaireacht).' Reference "'An Ghníomhaireacht um Chaomhnú Comhshaoil. Tuarascáil Bhliantúil agus Cuntais 2017,' an Ghníomhaireacht um Chaomhnú Comhshaoil, http://www.epa.ie/pubs/reports/other/corporate/EPA_AnnualReport_2017_GAE_web.pdf [15.7.2019]"
    Hacktivismus
    de
    Definition Verwendung von Computern und Computernetzwerken als Protestmittel, um politische und ideologische Ziele zu erreichen Reference "EP-DE nach Wikipedia > Hacktivismus ( 30.7.2019)"
    Comment eine Variation des Cyberaktivismus
    hacktivism | hactivism
    en
    Definition practice of promoting a political agenda by hacking, especially by defacing or disabling websites Reference "Krapp, P., 'Terror and Play, or What Was Hacktivism?', Grey Room, vol. 21, 2005, pp. 70-93. http://www.academia.edu/307639/Terror_and_Play_or_What_Was_Hacktivism [1.09.2015]"
    hacktivisme | cyberactivisme | cybermilitantisme | cyber-hacktivisme
    fr
    Definition pratique consistant à promouvoir un propos politique par le piratage informatique, en particulier en dégradant ou en désactivant des sites web Reference " PE-FR, d’après: Article de Peter Krapp, «Terror and Play, or What Was Hacktivism?», Grey Room d'octobre 2005 (26.4.2019)"
  4. EDUCATION AND COMMUNICATIONS|communications|communications policy
    oibríocht 'haiceáil agus sceith' Reference Faomhadh an téarma seo mar chuid de Thionscadal Lex
    ga
    „Hack-and-leak“-Operation
    de
    Definition strategische Vorgehensweise, bei der böswillige Akteure Cyberinstrumente einsetzen, um sensible oder geheime Daten zu erbeuten und diese anschließend zum Zweck der Einflussnahme und der Desinformation im Internet veröffentlichen Reference "COM-DE in Anlehnung an:War on the Rocks Media, LLC > HACK-AND-LEAK OPERATIONS AND U.S. CYBER POLICY (10.12.2021)"
    hack-and-leak operation | hack and leak operation
    en
    Definition operation in which malicious actors use cyber tools to gain access to sensitive or secret material and then release it in the public domain Reference "COM-Terminology Coordination, based on: War on the Rocks. Hack-and-leak operations and U.S. cyber policy (30.9.2021)"
    opération de piratage et de divulgation
    fr
    Definition opération menée par des acteurs malintentionnés consistant à pirater des informations sensibles et confidentielles et à les disséminer ensuite, notamment pour influencer les processus politiques Reference "COM-FR, d'après:- Radio-Canada > Techno > article de A. De Lancer du 31.10.2020, «Élections américaines: l'ingérence étrangère (encore) au rendez-vous» (14.10.2021)"
  5. EDUCATION AND COMMUNICATIONS|communications|communications industry|information technology · EDUCATION AND COMMUNICATIONS|information technology and data processing|computer system|information security
    suíomh gréasáin haiceáilte Reference "Tuairisc > Nuacht > Suíomh Gaeilge an IPA haiceáilte ag ‘Arm Leictreonach na nÉimineach’"
    ga
    kompromittierte Website | gehackte Website
    de
    Definition Website, auf die sich jemand unbefugt Zugriff verschafft hat, um sie zu verändern, d. h. in der Regel, dass ein Schadcode einfügt wird, um beispielsweise Spam zu versenden, Phishing-Seiten einzurichten, Werbung oder Links zu platzieren oder auf andere Websites umzuleiten Reference "Council-DE gestützt auf https://www.webhosting24.de/gehackt/ (19.2.2020)"
    compromised website | hacked website
    en
    Definition website that has been invaded by someone other than the owner or its administrative users with an intention to harm it, its visitors or to redirect visitors elsewhere Reference "Kinetic knowledge - Glossary (28.1.2020)"
    Comment A hacked website can harm users by serving malicious software, collect personal information, or redirect to sites they didn’t intend to visit.
    site internet compromis | site web compromis | site web piraté
    fr
    Definition site web dont un utilisateur malveillant a pris le contrôle, soit à l'aide d'un logiciel malveillant, soit à la suite d'un hameçonnage Reference "Conseil-FR, d'après le Portail linguistique de Microsoft, Banque terminologique Microsoft, fiche ""compromised"" (24.2.2020)"
    Comment "Voir aussi:- logiciel malveillant- hameçonnage"