Écoute pour la confidentialité

English translation: PINGS

GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW)
French term or phrase:Écoute pour la confidentialité
English translation:PINGS
Entered by: Mark Nathan

09:17 Dec 17, 2004
French to English translations [PRO]
Tech/Engineering - Computers: Systems, Networks
French term or phrase: Écoute pour la confidentialité
Architecture canonique - Liaison point à point

Attaque - Écoute pour la confidentialité, attaque par le milieu, rejeu

Défense - Authentification mutuelle

From a presentation about client server architecture
Mark Nathan
France
Local time: 21:56
[x?] PINGS
Explanation:
Here are all the types of attack from: webscreen-technology.com

ECOUTE refers to PINGS....PINGS mean to LISTEN ON THE NETWORK...I don't know about confidentiality. THE STUFF BELOW IS USEFUL:

There is much confusion over the differences between viruses, worms and DoS attacks. What is important to understand is an attack could compromise a number of these methods and one may rely on another to be effective.


Viruses
Viruses are defined as files that are self-replicating, regardless of whether they are malicious or not. The virus design places the virus into three classifications of viruses; boot sector, file-infecting, and macro.

Boot Sector
Boot sector viruses are platform-dependent. This virus mainly comes from infected floppy diskettes that are then used to boot to when the computer starts up. From the time of infection and every time the computer is booted, the virus is loaded and can infect any new floppy diskette placed in the computer.

File-infecting
These files need to be executed by the user, by launching the infected file. The virus then infects other files and depending on the program, can continue to infect files or unload itself and repeat the infection cycle every time an infected file is executed again.

Macro
Macro viruses are application-dependent, meaning that the virus can only run/affect the application the virus was written for. A macro is executed when the user opens an infected document in the appropriate application that uses the macro needed. The virus copies itself to the templates in the application in order to infect future documents so when new documents, are created they are infected with the macro virus as well.
Worms
Worms propagate primarily through e-mail and mainly spread through a network. A worm is network-aware and uses its awareness for its replication. There may or may not be a payload in a worm. If there is it could be a Virus or it could set up its host to be used in a DDoS attack

Trojans
A Trojan, also referred to as a Trojan Horse, may be or may not be a malicious program that does something other than advertised or expected. Many Trojans are used to place remote access tools onto the victim’s system to exploit the computer at the attacker's will and without the user’s knowledge. This makes them available for use for a DDoS attacks.
Denial of Service
Denial of Service (DoS) attacks specifically targeted, unlike viruses, worms, or Trojans.
DoS uses a single server or Internet Connected Computer to tie up a network’s connection, deny users access to the targeted web site, or flood the server with useless emails with the purpose of bringing the server down.
SYN Flood Attack
If hundreds of blank letters are posted into a post box every day it makes it harder for genuine letters to get through. If the post box is full, then it can't be used.

When one computer system wants to establish a connection with another, a process is used called a three-way-handshake.

The source sends a packet of data (a SYN) to the destination, the destination acknowledges and replies (SYN ack) to the source and waits for the source address to send a final acknowledgement (another ack).

Attackers have used this to send bogus SYN packets containing spoofed source IP addresses to targeted web servers. This means that the destination server waits for a response that is not going to happen.

When this is done multiple times from multiple sources it floods the destination server, which has a limit of unacknowledged SYNs or responses it can handle. This will ultimately bring down the server.
Page Flood
Hundreds of people are sent to enter the wrong shop, barring genuine customers from getting through the door.

A page flood is when one or web pages are requested enough times to excede the server's capacity to download the data.
Others
Smurf Attack
A Smurf attack floods your router with Internet Control Messaage Protocol (ICMP)*** echo request packets (pings)*** [will double check] . The destination address of each packet is the broadcast address of your network therefore creating a large amount of ICMP echo request and response traffic. Some Smurf attacks spoof the source IP address compounding the problem.

Fraggle Attack
A Fraggle attack uses UDP packets to unwittingly use ICMP echo requests in the same way as a Smurf attack.

UDP Attack
UDP floods happen when many packets of data are sent via UDP with a spoofed source address. This results in a backlog of UDP responses.

ICMP Flood Attack
A victim is sent a huge stream of ICMP packets. There are so many that the server cannot handle them,


--------------------------------------------------
Note added at 6 hrs 36 mins (2004-12-17 15:53:54 GMT)
--------------------------------------------------

PINGING is too technical though correct: just use LISTENING to ENSURE CONFIDENTIALITY....they MEAN LISTENING TO THE NETWORK to see if it\'s confidentiality [security] is maintained....

like in these:

... it from here; Bprobe & cprobe provide measurement of bottleneck and congestion bandwidth
using ping. ... It can listen passively to existing network traffic or ...
www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html - 101k - Dec 15, 2004 - Cached - Similar pages

Network Security: Firewall, Content filtering, firewall appliance ...
... filling its T-1 or T-3 with PING replies ... into a promiscuous mode, meaning that they
simply listen to all ... every port look like it\'s on it\'s own network, the span ...
www.hotbrick.com/glossary_s.html - 28k - Cached - Similar pages

Security Services
... must add devices to the network to listen to what ... discovery package at home which
“pounds” against your network. ... on his cable modem running a ping tool to ...
www.hiredgunconsulting.com/Security Services.htm - 12k - Cached - Similar pages

FINAL: [network] listening for confidentiality...[i think they mean to make sure it is SECURE]
Selected response from:

Jane Lamb-Ruiz (X)
Grading comment
Thanks again Jane
4 KudoZ points were awarded for this answer



Summary of answers provided
5[x?] PINGS
Jane Lamb-Ruiz (X)
2See comment
Charlotte Allen


  

Answers


3 hrs   confidence: Answerer confidence 2/5Answerer confidence 2/5
Écoute pour la confidentialité
See comment


Explanation:
I noticed noone was attempting a solution to this, so thought I might at least make some suggestions. At first I thought this was referring to something positive - 'we listen and protect your confidentiality', but coming after the heading 'attaque' and alongside two other items which are methods of obtaining access to protected systems, I had to conclude that this is describing another method of gaining access to users' private information.

So, now I'm thinking that it's something along the lines (expressed very badly) of 'eavesdropping on confidential information'. I don't know how 'eavesdropping' is expressed in IT/Internet terms, but I'm thinking along the lines of someone intercepting data transfers between two parties and 'listening to' (or reading) them, then using that confidential information for their own purposes.

Hope this makes sense to you. It's probably a load of old baloney, but at least I've had a go!



Charlotte Allen
United Kingdom
Local time: 20:56
Native speaker of: English
PRO pts in category: 4
Login to enter a peer comment (or grade)

6 hrs   confidence: Answerer confidence 5/5
Écoute pour la confidentialité
[x?] PINGS


Explanation:
Here are all the types of attack from: webscreen-technology.com

ECOUTE refers to PINGS....PINGS mean to LISTEN ON THE NETWORK...I don't know about confidentiality. THE STUFF BELOW IS USEFUL:

There is much confusion over the differences between viruses, worms and DoS attacks. What is important to understand is an attack could compromise a number of these methods and one may rely on another to be effective.


Viruses
Viruses are defined as files that are self-replicating, regardless of whether they are malicious or not. The virus design places the virus into three classifications of viruses; boot sector, file-infecting, and macro.

Boot Sector
Boot sector viruses are platform-dependent. This virus mainly comes from infected floppy diskettes that are then used to boot to when the computer starts up. From the time of infection and every time the computer is booted, the virus is loaded and can infect any new floppy diskette placed in the computer.

File-infecting
These files need to be executed by the user, by launching the infected file. The virus then infects other files and depending on the program, can continue to infect files or unload itself and repeat the infection cycle every time an infected file is executed again.

Macro
Macro viruses are application-dependent, meaning that the virus can only run/affect the application the virus was written for. A macro is executed when the user opens an infected document in the appropriate application that uses the macro needed. The virus copies itself to the templates in the application in order to infect future documents so when new documents, are created they are infected with the macro virus as well.
Worms
Worms propagate primarily through e-mail and mainly spread through a network. A worm is network-aware and uses its awareness for its replication. There may or may not be a payload in a worm. If there is it could be a Virus or it could set up its host to be used in a DDoS attack

Trojans
A Trojan, also referred to as a Trojan Horse, may be or may not be a malicious program that does something other than advertised or expected. Many Trojans are used to place remote access tools onto the victim’s system to exploit the computer at the attacker's will and without the user’s knowledge. This makes them available for use for a DDoS attacks.
Denial of Service
Denial of Service (DoS) attacks specifically targeted, unlike viruses, worms, or Trojans.
DoS uses a single server or Internet Connected Computer to tie up a network’s connection, deny users access to the targeted web site, or flood the server with useless emails with the purpose of bringing the server down.
SYN Flood Attack
If hundreds of blank letters are posted into a post box every day it makes it harder for genuine letters to get through. If the post box is full, then it can't be used.

When one computer system wants to establish a connection with another, a process is used called a three-way-handshake.

The source sends a packet of data (a SYN) to the destination, the destination acknowledges and replies (SYN ack) to the source and waits for the source address to send a final acknowledgement (another ack).

Attackers have used this to send bogus SYN packets containing spoofed source IP addresses to targeted web servers. This means that the destination server waits for a response that is not going to happen.

When this is done multiple times from multiple sources it floods the destination server, which has a limit of unacknowledged SYNs or responses it can handle. This will ultimately bring down the server.
Page Flood
Hundreds of people are sent to enter the wrong shop, barring genuine customers from getting through the door.

A page flood is when one or web pages are requested enough times to excede the server's capacity to download the data.
Others
Smurf Attack
A Smurf attack floods your router with Internet Control Messaage Protocol (ICMP)*** echo request packets (pings)*** [will double check] . The destination address of each packet is the broadcast address of your network therefore creating a large amount of ICMP echo request and response traffic. Some Smurf attacks spoof the source IP address compounding the problem.

Fraggle Attack
A Fraggle attack uses UDP packets to unwittingly use ICMP echo requests in the same way as a Smurf attack.

UDP Attack
UDP floods happen when many packets of data are sent via UDP with a spoofed source address. This results in a backlog of UDP responses.

ICMP Flood Attack
A victim is sent a huge stream of ICMP packets. There are so many that the server cannot handle them,


--------------------------------------------------
Note added at 6 hrs 36 mins (2004-12-17 15:53:54 GMT)
--------------------------------------------------

PINGING is too technical though correct: just use LISTENING to ENSURE CONFIDENTIALITY....they MEAN LISTENING TO THE NETWORK to see if it\'s confidentiality [security] is maintained....

like in these:

... it from here; Bprobe & cprobe provide measurement of bottleneck and congestion bandwidth
using ping. ... It can listen passively to existing network traffic or ...
www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html - 101k - Dec 15, 2004 - Cached - Similar pages

Network Security: Firewall, Content filtering, firewall appliance ...
... filling its T-1 or T-3 with PING replies ... into a promiscuous mode, meaning that they
simply listen to all ... every port look like it\'s on it\'s own network, the span ...
www.hotbrick.com/glossary_s.html - 28k - Cached - Similar pages

Security Services
... must add devices to the network to listen to what ... discovery package at home which
“pounds” against your network. ... on his cable modem running a ping tool to ...
www.hiredgunconsulting.com/Security Services.htm - 12k - Cached - Similar pages

FINAL: [network] listening for confidentiality...[i think they mean to make sure it is SECURE]

Jane Lamb-Ruiz (X)
Works in field
Native speaker of: Native in EnglishEnglish, Native in PortuguesePortuguese
PRO pts in category: 75
Grading comment
Thanks again Jane
Login to enter a peer comment (or grade)



Login or register (free and only takes a few minutes) to participate in this question.

You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.

KudoZ™ translation help

The KudoZ network provides a framework for translators and others to assist each other with translations or explanations of terms and short phrases.


See also:
Term search
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search