Related procedures:
Download the [su_button url=”https://dev.termcoord.eu/wp-content/uploads/2019/06/EP-Cybersecurity-project_562019.xlsx” style=”3d”]Multilingual Excel file[/su_button]
Batch 3
IATE ID | Source term |
115472 | computer worm worm |
321544 | intrusion |
3575524 | penetration |
279592 | information management |
1746399 | time bomb |
3571670 | cyber-physical system CPS |
1488284 | cybernetics |
3544576 | click fraud |
233418 | spamming |
912495 | spam |
290860 | dial-up access |
3576761 | revenge porn revenge pornography nonconsensual pornography |
3576762 | age verification system age gate adult verification system AVS |
3576763 | cyber-surveillance |
3576764 | Cybercrime Convention Committee Convention Committee on Cybercrime T-CY |
3545047 | Privacy Impact Assessment PIA |
2232704 | content data |
3576587 | data preservation |
3576765 | computer forensic examination forensic examination of computers |
2111623 | CAPTCHA Completely Automated Public Turing Test to Tell Computers and Humans Apart |
Batch 2
IATE ID | Source terms |
115472 | computer worm / worm |
922018 | digital illiteracy |
176235 | firewall / Internet firewall |
321544 | intrusion / penetration |
371042 | intrusion detection system / intruder detection system / IDS |
115471 | logic bomb |
123064 | cryptanalysis |
50572 | data aggregation |
905726 | security classification marking / classification marking / security marking |
897320 | proxy server |
380826 | internet traffic |
3532413 | online fraud / internet fraud |
316271 | encryption algorithm / cryptographic algorithm / encipherment algorithm / cryptological algorithm |
279592 | information management |
900978 | cryptographic key / cypher key |
IATE ID | Source terms |
265898 | cyberwarfare / cyber war |
3565143 | cyber espionage / cyberspying |
3565805 | cyber-weapon |
3520630 | information security incident / security incident |
3520629 | information security event / security event |
3564790 | information security risk / security risk |
157446 | security architecture |
1613434 | information security |
3570399 | information security policy |
1399631 | information security standard |
3503639 | Information Security Management System / ISMS |
3570398 | information security management |
3564786 | information security governance |
930374 | Internet activist / cyberactivist |
3519107 | cyber deterrence |
3504207 | Cooperative Cyber Defence Centre of Excellence / CCDCOE |
47170 | information infrastructure |
3504208 | critical information infrastructure |
2251259 | Critical Information Infrastructure Protection |
3565142 | cyber risk |
1484635 | computer virus / virus |
933881 | phishing |
899307 | denial of service / DoS |
1484647 | denial-of-service attack / DoS attack |
918800 | distributed denial-of-service attack / DDoS attack |
3574081 | IoT trusted label / trusted IoT label |
3574082 | cyber sabotage |
3574084 | illegal system interference |
3574085 | privacy breach |
1239567 | industrial espionage / industrial spying / economic espionage |