英語 での Attack scenario の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Risks and attack scenarios.
I can input all the information and get us an attack scenario.
Ground attack scenario.
The group used three very distinct attack scenarios.
Predictive attack scenarios and proactive mitigations.
Provide a concrete attack scenario.
Common attack scenarios and how to secure privileged access.
Israel, an impressive exercise in the worst terrorist attack scenario.
Availability attack scenario: take widespread control of digital home assistants.
Validate performance under real network conditions, attack scenarios, and service environments.
The attack scenario is actually pretty simple,” Check Point's Itkin says.
It's worth noting that the email-based attack scenario would be blocked in many cases.
There are also attack scenarios in which users don't need to take any action to launch a Trojan.
If necessary, we write verification code, and test whether hypothetical attack scenarios will succeed.
Considering the attack scenario, this vulnerability is not considered high risk to customers.
However, by restricting transit traffic which originates from a downstream network to known, and intentionally advertised, prefix(es), the problem of source addressspoofing can be virtually eliminated in this attack scenario.
The attack scenario was irrational on the part of the alleged hijackers, and its execution is incomprehensible in light of their behavior.
The speculative scenario outlined in Attack Scenario 404 explains how the attack might have been carried out by as few as twelve individuals.
This attack scenario was thoroughly tested in a penetration test by Cure53, which was also involved in developing the security concepts used by Mailvelope.
It is not a formal attack scenario, but it collects sufficient information of attack target ahead of time. Perform the same attack as real.
In an attack scenario, an attacker would have to convince the user to open a specially crafted file that would invoke the vulnerable sandboxed application, resulting in a compromise of the sandbox policy.
In a different collusion attack scenario, an attacker may obtain several completely different contents containing the same watermark and produce an averaged signal.
Attack scenario: perform a targeted attack against an individual using hidden voice commands An attacker embeds hidden voice commands into video content, uploads it to a popular video sharing service, and artificially promotes the video using a Sybil attack. .
So although we agree that some of the attack scenarios in the paper are rather impractical, do not let this fool you into believing key reinstallation attacks cannot be abused in practice.
Attack scenario: hijack autonomous military drones By use of an adversarial attack against a reinforcement learning model, autonomous military drones are coerced into attacking a series of unintended targets, causing destruction of property, loss of life, and the escalation of a military conflict.
NET application attack scenario, an attacker could modify the contents of an XML file without invalidating the signature associated with the file.
Attack scenario: discredit a company or brand by poisoning a search engine's autocomplete functionality An adversary employs a Sybil attack to poison a web browser's auto-complete function so that it suggests the word"fraud" at the end of an auto-completed sentence with a target company name in it.
Availability attack scenario: evade fake news detection systems to alter political discourse Fake news detection is a relatively difficult problem to solve with automation, and hence, fake news detection solutions are still in their infancy.
Availability attack scenario: take widespread control of digital home assistants Scenario: take widespread control of digital home assistants An attacker forges a'leaked' phone call depicting plausible scandalous interaction involving high-ranking politicians and business people.