mirror of
https://github.com/iftas-org/lote.git
synced 2025-04-04 16:33:43 +03:00
commit
023c8aa086
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Account Takeover
|
||||
Kontoübernahme
|
||||
|
||||
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Coordinated Inauthentic Behavior
|
||||
Koordiniertes unauthentisches Verhalten
|
||||
|
||||
Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Copyright Infringement
|
||||
Urheberrechtsverletzung
|
||||
|
||||
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Doxxing
|
||||
Doxxen
|
||||
|
||||
The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Hate Speech
|
||||
Hassrede
|
||||
|
||||
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Misinformation
|
||||
Fehlinformationen
|
||||
|
||||
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.
|
||||
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Account Takeover
|
||||
Toma de control de cuenta
|
||||
|
||||
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
|
||||
El escenario en el que un usuario no autorizado adquiera el control de una cuenta de usuario, a través de medios tales como hacking, phishing o compra de credenciales filtradas.
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Astroturfing
|
||||
Campaña de simulación
|
||||
|
||||
Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Brigading
|
||||
Intervención coordinada
|
||||
|
||||
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.
|
||||
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
La pratique frauduleuse consistant à envoyer des courriels ou d'autres messages censés provenir de sources fiables, afin d'inciter les destinataires à révéler des informations personnelles tels que mots de passe ou numéros de carte de crédit.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Account Takeover
|
||||
アカウントの乗っ取り
|
||||
|
||||
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Spam
|
||||
スパム
|
||||
|
||||
Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Account Takeover
|
||||
Account overname
|
||||
|
||||
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Brigading
|
||||
Georganiseerde aanval
|
||||
|
||||
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.
|
||||
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Content- and Conduct-Related Risk
|
||||
Risico's gerelateerd aan inhoud en gedrag
|
||||
|
||||
The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Copyright Infringement
|
||||
Auteursrechtenschending
|
||||
|
||||
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Counterfeit
|
||||
Vervalsing
|
||||
|
||||
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Disinformation
|
||||
Disinformatie
|
||||
|
||||
False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Glorification of Violence
|
||||
Glorificatie van geweld
|
||||
|
||||
Statements or images that celebrate past or hypothetical future acts of violence.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Misinformation
|
||||
Misinformatie
|
||||
|
||||
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.
|
||||
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Synthetic Media
|
||||
Synthetische Media
|
||||
|
||||
Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media.
|
||||
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Account Takeover
|
||||
Hesap Devralma
|
||||
|
||||
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.
|
||||
Yetkisiz bir kullanıcının bilgisayar korsanlığı, kimlik avı veya sızdırılmış kimlik bilgilerini satın alma gibi yöntemlerle bir kullanıcı hesabının kontrolünü ele geçirdiği senaryo.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Copyright Infringement
|
||||
Telif Hakkı İhlali
|
||||
|
||||
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Counterfeit
|
||||
Sahte
|
||||
|
||||
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Glorification of Violence
|
||||
Şiddeti yüceltme
|
||||
|
||||
Statements or images that celebrate past or hypothetical future acts of violence.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Hate Speech
|
||||
Nefret Söylemi
|
||||
|
||||
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Impersonation
|
||||
Kişisellleştirme
|
||||
|
||||
Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them.
|
||||
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
|
||||
|
|
|
@ -1 +1,3 @@
|
|||
Phishing
|
||||
|
||||
伪造邮件或其他消息,谎称来自可靠来源,以诱骗个人泄露密码、信用卡号等个人信息的欺诈行为。
|
||||
|
|
Loading…
Reference in a new issue