Werbung
 Übersetzung für 'unauthorized access' von Englisch nach Deutsch
NOUN   an unauthorized access | unauthorized accesses
unauthorized accessFremdzugriff {m}
unauthorized accessunerlaubter Zugriff {m}
electr.
unauthorized access
unberechtigter Zugriff {m}
4 Wörter
access by unauthorized personsZutritt {m} Unbefugter
Teiltreffer
med.
intravenous access <IV access> [peripheral venous catheter]
peripher-venöser Zugang {m}
unauthorized {adj}eigenmächtig [unbefugt]
393
unauthorized {adj}unautorisiert
unauthorized {adj}unberechtigt
347
unauthorized {adj}ungenehmigt
11
unauthorized {adj}unerlaubt
380
unauthorized {adj}unbefugt
1019
unauthorized {adj}unzulässig
343
unauthorized {adj}ohne Vollmacht [nachgestellt]
unauthorized {adj}nichtautorisiert
302
unauthorized {adj}nicht autorisiert
unauthorized {adj}nicht berechtigt
unauthorized {adj}nicht bevollmächtigt
unauthorized {adj}nicht genehmigt
unauthorized strikewilder Streik {m}
unauthorized individualsUnbefugte {pl}
unauthorized personsUnbefugte {pl}
hunting
unauthorized hunter
Wilderer {m}
unauthorized absenceunentschuldigtes Fernbleiben {n}
unauthorized personUnbefugter {m}
24 Übersetzungen
Neue Wörterbuch-Abfrage: Einfach jetzt tippen!

Anwendungsbeispiele Englisch
  • To help with data integrity, firewalls protect stored data against unauthorized access, while simply backing up data allows recovery should the data or equipment be damaged.
  • Some systems also implement "mandatory locks", where attempting unauthorized access to a locked resource will force an exception in the entity attempting to make the access.
  • While some may claim that wardriving is illegal, there are no laws that specifically prohibit or allow wardriving, though many localities have laws forbidding unauthorized access of computer networks and protecting personal privacy.
  • Hackers have exploited vulnerabilities in Adobe programs, such as Adobe Reader, to gain unauthorized access to computers.
  • Because the DHCP server has no secure mechanism for authenticating the client, clients can gain unauthorized access to IP addresses by presenting credentials, such as client identifiers, that belong to other DHCP clients.

  • Role based access control interference is a relatively new issue in security applications, where multiple user accounts with dynamic access levels may lead to encryption key instability, allowing an outside user to exploit the weakness for unauthorized access.
  • Many vendors of SCADA and control products have begun to address the risks posed by unauthorized access by developing lines of specialized industrial firewall and VPN solutions for TCP/IP-based SCADA networks as well as external SCADA monitoring and recording equipment.
  • The operating system that runs on the microprocessor mediates the reader's access to those components to prevent unauthorized access.
  • Using one-time passwords may prevent unauthorized access to an account which has had its login details exposed to an attacker via a keylogger, as each password is invalidated as soon as it is used.
  • Computer security is a branch of computer technology with the objective of protecting information from unauthorized access, disruption, or modification while maintaining the accessibility and usability of the system for its intended users.

  • To prevent unauthorized access to an instrument tamper-proof seals are usually applied after calibration.
  • For example, if a building catches fire, fail-safe systems would unlock doors to ensure quick escape and allow firefighters inside, while fail-secure would lock doors to prevent unauthorized access to the building.
  • In telecommunications, communications protection is the application of communications security (COMSEC) measures to telecommunications systems in order to: (a) deny unauthorized access to sensitive unclassified information of value, (b) prevent disruption of telecommunications services, or (c) ensure the authenticity of information handled by telecommunications systems.
  • To access a U2F authenticator, the claimant is required to perform a test of user presence (TUP), which helps prevent unauthorized access to the authenticator's functionality.
  • Special public member methods – accessors (aka getters) and mutator methods (often called setters) are used to control changes to class variables in order to prevent unauthorized access and data corruption.

  • Although their payload can be anything, many modern forms act as a backdoor, contacting a controller who can then have unauthorized access to the affected computer.
  • Cockpit doors on many aircraft are reinforced and bulletproof to prevent unauthorized access.
  • This reduces the risk of unauthorized access of resources.
  • A computer system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized.
Werbung
© dict.cc English-German dictionary 2024
Enthält Übersetzungen von der TU Chemnitz sowie aus Mr Honey's Business Dictionary (nur Englisch/Deutsch).
Links auf das Wörterbuch oder auch auf einzelne Übersetzungen sind immer herzlich willkommen!