#
an illegal action in cyberspace by which an attacker gains entry into the target system.
— cybrary.it
"The methodology involves layering heterogeneous security technologies in the common attack vectors to ensure that attacks missed by one technology are caught by another."
— ferc.gov
"[...] panaudotas tas pats atakos vektorius kenkėjo, kuris vykdė atakas ir platino netikras naujienas."
— lrt.lt
"Den hyppigste angrebsvektor brugt til at brugt inficere virksomheder med ondsindet spam [...]"
— elektronikfokus.dk
"Vi [...] identifiserer skadevare, angrepsvektor og verktøy."
— netsecurity.no
#
an illegal action in cyberspace which is an attack conducted by multiple systems flooding the bandwidth or resources of a targeted system.
— thecyberwire.com
"A surge of DDoS attacks lasting several weeks caused disruptions at institutional sites [...]"
— ec.europa.eu
"Apie ankstesnius išpuolius žinojo tik saugumo specialistai ir tie, prieš kuriuos buvo nukreiptos DDoS atakos."
— veikia.lt
"Det kan være svært at undgå at blive ramt af et DDoS-angreb, da det er et angreb udefra."
— sikkerdigital.dk
"Den største mengden DDoS-angrep er økonomisk motivert."
— nettvett.no
#
an illegal action in cyberspace which is an attempt to acquire sensitive information by impersonating as a trustworthy entity.
— cybrary.it
"[...] the operators gained an initial foothold on the network using a phishing email [...]"
— thehackernews.com
"Pavojingiausias ir populiariausias – asmeninės informacijos, t.y., duomenų viliojimas su tikslu „uždirbti“ pinigus."
— alfa.lt
"Instrumenter som identitetstyveri, phising, spam og ondsindede koder kan benyttes til at begå svig i stor målestok."
— CELEX:52007DC0267/DA
"Det finnes flere ulike programmer på nett for deteksjon av phishing."
— no.wikipedia.org
#
an illegal action in cyberspace by which a person or program successfully masquerades as another by falsifying data thereby gaining an illegitimate advantage.
— CELEX:52008SC0511/EN
"According to the latest DDoS report [...], more than half of all denial-of-service attacks[...] involved [...] spoofing."
— krebsonsecurity.com
"Apsimestinėse atakose programišius šniukštinėja ir klausosi srauto, kuris keliauja tinklu nuo siuntėjo iki gavėjo."
— esparama.lt
"Vi ved af erfaring, at svindlerne typisk bruger et tilfældigt nummer til spoofing [...]"
— tdc.dk
"Svindlere som praktiserer spoofing bruker både eksisterende og falske telefonnumre. "
— telenor.no
Student project: Glossary (EN, LT, DA, NO) of Cybersecurity Terms
Creative Commons Attribution 4.0 International