GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
10:32 Feb 4, 2016 |
French to English translations [PRO] Bus/Financial - IT (Information Technology) / Only one answer will do | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Ed Ashley United Kingdom Local time: 01:43 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
4 +2 | abuse/misuse of privileged accounts |
| ||
4 -1 | misuse of privileged accounts |
|
Summary of reference entries provided | |||
---|---|---|---|
this link might come in handy |
|
misuse of privileged accounts Explanation: For example, somebody has an administrator account and uses it to find the personal details of somebody they are interested in. -------------------------------------------------- Note added at 14 mins (2016-02-04 10:47:15 GMT) -------------------------------------------------- It can also be somebody misusing somebody else's account. |
| |
Login to enter a peer comment (or grade) |
abuse/misuse of privileged accounts Explanation: As far as I can see, the literal translation is perfectly valid here: "Les comptes à privilèges représentent des cibles de choix pour les attaquants du Système d'Information." http://www.itpro.fr/a/proteger-comptes-privileges-si/ "Cyber attackers exploit privileged accounts every day, in organizations of all sizes." http://www.cyberark.com/securing-privileged-accounts-best-pr... Also see http://www.forbes.com/sites/richardstiennon/2013/05/16/grasp... -------------------------------------------------- Note added at 15 mins (2016-02-04 10:48:17 GMT) -------------------------------------------------- The latter link provides the following definition: "A privileged account is how administrators log in to servers, switches, firewalls, routers, database servers, and the many applications they must manage. Many of these systems are not within a Windows domain and by default allow simple username/password pairs to log in." |
| ||||||||||||
Grading comment
| |||||||||||||
|
1 hr peer agreement (net): -1 |
Reference: this link might come in handy Reference information: file:///C:/Users/HP/Downloads/survey-cyberarks-2015-global-advanced-threat-landscape-09-30-15.pdf -------------------------------------------------- Note added at 1 day20 hrs (2016-02-06 06:46:09 GMT) -------------------------------------------------- I'm sorry Louise, as Daryo kindly pointed out, I made a silly mistake: http://www.dit.co.jp/products/cyber-ark/pdf/survey-cyberarks... |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.