22:40 Jul 25, 2001 |
English to Spanish translations [PRO] Tech/Engineering | |||||
---|---|---|---|---|---|
|
| ||||
| Selected response from: tazdog (X) Spain Local time: 20:54 | ||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
na | ataques basados en datos |
| ||
na | Lo dejaría como está |
| ||
na | ...ataques guiados por datos... |
|
ataques basados en datos Explanation: Here is an explanation in English, and some references similar to your text in Spanish. Data-Driven Attacks A data-driven attack is one which involves the data transferred by a protocol, instead of the server that implements it. Once again, there are two types of data-driven attacks; attacks that involve evil data, and attacks that compromise good data. Viruses transmitted in electronic mail messages are data-driven attacks that involve evil data. Attacks that steal credit-card numbers in transit are data-driven attacks that compromise good data.(http://www.alphabetstreet.infront.co.uk/computing/features/f... Ataques basados en datos: si los programas que son accedidos a través del cortafuegos, como el servidor web, ocultan errores graves, un hacker podría explotarlos haciendo uso exclusivamente de tráfico HTTP (véase Sobre puertas y ratoneras para una descripción en detalle de estos ataques). Los virus constituyen una amenaza difícil de rechazar incluso para los cortafuegos más sofisticados (http://www.iec.csic.es/criptonomicon/susurros/susurros24.htm... Ataques basados en datos. Existen ataques basados en fallos en programas que se ejecutan en el servidor, como sendmail o ghostscript, o programas en CGI diseñados para comercio electrónico o gestión de datos. Dado que muchos de ellos se acceden a través de protocolos permitidos por el cortafuegos, éste se ve impotente a la hora de impedir que se lleven a efecto (http://www.security-informer.com/english/crd_cortafuegos_292... De qué no protege un cortafuegos • Ataques desde el interior • Ataques que no pasan por el cortafuegos • Infección de virus sofisticados • Ataques basados en datos • Ataques completamente nuevos (http://ants.dif.um.es/circus/work/umar/alvarez.pdf) Hope it helps. |
| |
Grading comment
| ||
Login to enter a peer comment (or grade) |
Lo dejaría como está Explanation: data-driven attack: A technique that puts carefully crafted input into the front-end of a system in order to causes an unexpected result in the back-end. A classic example would be to insert an SQL query in an HTML FORM field which will pass through the firewall, web server, CGI script, all the way through to the back-end database. Data-driven attacks are particularly dangerous because few web programmers are trained in secure-programming techniques, which results in a constent stream of them appearing. Many companies have HTML FORMS that manipulate back-end databases; most of them can be hacked with data-driven attacks. The only defenses are thorough education of the programmers who write the systems, or create a system that thoroughly untaints the data (such as specialized proxies). Comentarios varios: Firewalls no pueden proteger contra “data-driven attacks”, ataques en los cuales algo es enviado por correo o copiado a un Host interno donde luego es ejecutado. Un firewall es un sistema o grupo de sistemas que se encargan de mantener una política de control de acceso entre dos redes. Espero que te sirva, mucha suerte!!!!! |
| |
Login to enter a peer comment (or grade) |
...ataques guiados por datos... Explanation: That's how Eurodicautom puts it. Take a look below, in the Informatics Section... Reference: http://eurodic.ip.lu/cgi-bin/edicbin/EuroDicWWW.pl |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.