#
a cybersecurity measure which is a software designed to detect, stop and remove viruses and other kinds of malicious software.
— ncsc.gov.uk
"[...] install trusted antivirus software to safeguard against viruses and associated malware."
— prowess.org.uk
"[...] visoms bendrosioms paslaugoms apsaugoti turi būti naudojamos [...] šios priemonės: užkarda, antivirusinė programa ir įsilaužimo aptikimo sistema."
— CELEX: 32007D0171
"Avanceret antivirus [...] kan stilles til rådighed for alle internetbrugere i Europa ved hjælp af en cloud-platform og reducere brugerens behov for at beskytte sig selv."
— CELEX: 52011AE0816
"Antivirus regnes ofte som nødvendig sikkerhetsutstyr hvis man bruker internett på Windows-operativsystemer."
— no.wikipedia.org
#
a vulnerability which refers to a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser.
— thecyberwire.com
"Fixed an issue with reloads and redirects that could allow spoofing and cross-site scripting ."
— avencius.nl
"[...] kodas buvo pastoviojo tipo, jis išnaudojo sukryžminto svetainių kodavimo pažeidžiamumą [...] socialiniame tinkle."
— tinklusaugumas.lt
"Tre af sårbarhederne er af typen cross-site scripting."
— cert.dk
"Ved Cross-Site Scripting angrep utnytter angriperen en svakhet i webapplikasjonen [...]"
— blogg.bekk.no
#
a cybersecurity measure which is a system designed to prevent unauthorised access to or from a private electronic network.
— cms.unov.org
"Cybersecurity products, such as [...] firewalls [...] are effective in the identification and prevention of some types of attack."
— ec.europa.eu
"Ugniasienė sulaiko didžiąją dalį kenkėjiškų duomenų jų tiesiog nepraleisdama į saugomą tinklą ar kompiuterį."
— goit.lt
"Oftest sidder firewallen mellem adgang til et ubeskyttet netværk som fx Internet og et beskyttet netværk fx LAN."
— da.wikipedia.org
"Brannmurens oppgave er å kontrollere trafikk mellom datanettverk med ulike tillitsforhold. "
— no.wikipedia.org
#
a cybersecurity measure which is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts.
— searchsecurity.techtarget.com
"A standard research method involves using a so-called honeypot , a computer set up to appear attractive to hackers that can identify the computer sources of an attack [...]"
— theguardian.com
"Medaus puodynės gali veikti bet kokioje operacinėje sistemoje ir valdyti bet kokį paslaugų skaičių."
— tinklusaugumas.lt
"Forskernes skjulte dagsorden med at få fulgt op på følgere var at generere yderligere botnet-trafik, som ville gå gennem deres honeypots […]"
— version2.dk
"Det finnes ulike måter å realisere en honeypot på."
— uia.brage.unit.no
#
a cybersecurity measure that is a method for examining the security of a computer system in order to identify potential vulnerabilities.
— iso.org
— ouritdept.co.uk
"[...] threat actors have favoured other types of attack vectors, in particular those that employ legitimate tools, including penetration testing software."
— ec.europa.eu
"Skverbimosi testavimas yra vienas iš būdų, kaip nustatyti sistemos sritis, kurios yra pažeidžiamos dėl neteisėtų ir kenksmingų vartotojų ar subjektų įsilaužimo ir vientisumo bei patikimumo pažeidimo."
— androidbest.ru/lt
"Tidligere arbejdede Kevin hos Bishop Fox med at udføre test til indtrængning."
— kb.netgear.com
"Penetrasjonstesting er betegnelsen på inntrengningsforsøket en etisk hacker, ansatt i et IT-sikkerhetsfirma [...]"
— netsecurity.no
#
a cybersecurity measure that is a technique which allows untrusted programs written in an unsafe language to be executed safely within the single virtual address space of an application.
— cybrary.it
"They employ the principle of "defense in depth" to provide multiple layers of protection, including sandboxing [...]"
— technotricks.in
"[...] technika, suprojektuota užtikrinti saugų kodo vykdymą, kaip [...] smėlio dėžės efektas."
— ec.europa.eu
"Den reguleringsmæssige sandkasse er et nyttigt og i nogle tilfælde nødvendigt værktøj [...]"
— CELEX: 52018DC0795
"Sandboxing benyttes ofte som en del av antivirusverktøy [...]"
— snl.no
#
a cybersecurity measure which is a network that connects private subscribers together using the public Internet as the transport medium, while ensuring that their traffic is not readable by the Internet at large.
— iate.europa.eu
"VPN ( virtual private network ) enables secure transmission of data across the public Internet."
— wirelesswatch.jp
"VPN gali būti naudojamas daugeliu būdų, įskaitant galimybę pasiekti blokuojamas svetaines ir galimybę pasiekti informaciją iš užsienio."
— diena.lt
"[…] der ikke må lækkes oplysninger til andre systemer på nettet; f.eks. er indbyrdes sammenkobling af forskellige IP-VPN'er ikke tilladt."
— CELEX: 32007D0171
"VPN er en god måte for å sikre at din private informasjon forblir privat når du bruker internett."
— nettvett.no
#
a vulnerability by which an attacker can obtain a password by running password cracking tools against the password hash within a reasonable amount of time using commodity hardware.
— port.ac.uk
"Two-factor authentication aims to reduce the impact of weak passwords by adding an extra security component."
— ec.europa.eu
"Vienas silpnas slaptažodis gali padėti programišiams įsilaužti į sistemą ir pavogti duomenis, taip pakenkdamas visai įmonei."
— pctech.lt
"Har man et svagt kodeord tilknyttet sin digitale brugerkonto, så er man mere sårbar over for hackerangreb."
— via.ritzau.dk
"Et svakt passord er derimot kort og ofte åpenbart [...]"
— tripletex.no
Student project: Glossary (EN, LT, DA, NO) of Cybersecurity Terms
Creative Commons Attribution 4.0 International