Student project: Glossary (EN, LT, DA, NO) of Cybersecurity Terms
Lithuanian
A
B
C
Č
D
E
Ė
Ę
F
G
H
I
Į
Y
J
K
L
M
N
O
P
Q
R
S
Š
T
U
Ų
Ū
V
W
X
Z
Ž
#
Detection of CS events
»
Illegitimate cyber actions
Detection of CS events
»
Illegitimate cyber actions
Detection of CS events
»
Illegitimate cyber actions
Detection of CS events
»
Illegitimate cyber actions
EN
D
D
o
S
a
t
t
a
c
k
NP
d
i
s
t
r
i
b
u
t
e
d
d
e
n
i
a
l
-
o
f
-
s
e
r
v
i
c
e
a
t
t
a
c
k
NP
LT
D
D
o
S
a
t
a
k
a
NP
p
a
s
k
i
r
s
t
y
t
o
a
t
s
i
s
a
k
y
m
o
a
p
t
a
r
n
a
u
t
i
k
i
b
e
r
n
e
t
i
n
e
s
a
t
a
k
a
s
NP
DA
D
D
o
S
-
a
n
g
r
e
b
NP
d
i
s
t
r
i
b
u
t
e
d
d
e
n
i
a
l
o
f
s
e
r
v
i
c
e
-
a
n
g
r
e
b
NP
NO
D
D
o
S
-
a
n
g
r
e
p
NP
t
j
e
n
e
s
t
e
n
e
k
t
-
a
n
g
r
e
p
NP
an illegal action in cyberspace which is an attack conducted by multiple systems flooding the bandwidth or resources of a targeted system.
— thecyberwire.com
"A surge of DDoS attacks lasting several weeks caused disruptions at institutional sites [...]"
— ec.europa.eu
"Apie ankstesnius išpuolius žinojo tik saugumo specialistai ir tie, prieš kuriuos buvo nukreiptos DDoS atakos."
— veikia.lt
"Det kan være svært at undgå at blive ramt af et DDoS-angreb, da det er et angreb udefra."
— sikkerdigital.dk
"Den største mengden DDoS-angrep er økonomisk motivert."
— nettvett.no
#
Detection of CS events
»
Illegitimate cyber actions
Detection of CS events
»
Illegitimate cyber actions
Detection of CS events
»
Illegitimate cyber actions
Detection of CS events
»
Illegitimate cyber actions
EN
p
h
i
s
h
i
n
g
N
LT
d
u
o
m
e
n
ų
v
i
l
i
o
j
i
m
a
s
NP
d
u
o
m
e
n
ų
v
a
g
y
s
t
ė
NP
f
i
š
i
n
g
a
s
N
"
p
h
i
s
h
i
n
g
"
N
DA
p
h
i
s
h
i
n
g
N
NO
p
h
i
s
h
i
n
g
N
n
e
t
t
f
i
s
k
e
N
p
h
i
s
k
e
N
an illegal action in cyberspace which is an attempt to acquire sensitive information by impersonating as a trustworthy entity.
— cybrary.it
"[...] the operators gained an initial foothold on the network using a phishing email [...]"
— thehackernews.com
"Pavojingiausias ir populiariausias – asmeninės informacijos, t.y., duomenų viliojimas su tikslu „uždirbti“ pinigus."
— alfa.lt
"Instrumenter som identitetstyveri, phising, spam og ondsindede koder kan benyttes til at begå svig i stor målestok."
— CELEX:52007DC0267/DA
"Det finnes flere ulike programmer på nett for deteksjon av phishing."
— no.wikipedia.org