elevation of privilege

"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information."
رفع الامتيازات

English-Arabic terms dictionary. 2015.

Look at other dictionaries:

  • Privilege escalation — is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application… …   Wikipedia

  • Elevation (disambiguation) — Elevation, literally (up)lifting something or someone higher (also figuratively), can refer to:*Elevation (liturgy) of consecrated bread and wine in Mass. *Elevation, the height of a geographic location above mean sea level *Elevation, the… …   Wikipedia

  • Privilege (informatique) — Privilège (informatique) Pour les articles homonymes, voir privilège. Dans le domaine de l informatique, les privilèges permettent à un administrateur d effectuer des actions que les simples utilisateurs ne peuvent faire. Voir aussi séparation… …   Wikipédia en Français

  • Privilège (informatique) — Pour les articles homonymes, voir privilège. Dans le domaine de l informatique, les privilèges permettent à un administrateur d effectuer des actions que les simples utilisateurs ne peuvent faire. Voir aussi séparation des privilèges élévation… …   Wikipédia en Français

  • Comparison of privilege authorization features — A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the computer system. Operating systems lacking such features, such as DOS, Windows implementations …   Wikipedia

  • User Interface Privilege Isolation — (UIPI Isolation des privilèges de l IHM) est une technique de sécurité utilisée par Windows Vista et Windows Server 2008 pour se protéger contre les exploits d injection de code. UIPI évite qu un processus ayant un bas niveau de sécurité… …   Wikipédia en Français

  • Rootkit — Pronunciation of Rootkit in US English Un rootkit (le nom « outil de dissimulation d activité » est également utilisé[1]), parfois simplement « kit », est un ensemble de techniques mises en œuvre par un ou plusieurs logiciels …   Wikipédia en Français

  • Windows Virtual PC — This article is about the virtualization software by Microsoft. For the generic term, see Virtual machine. Windows Virtual PC Windows Virtual PC …   Wikipedia

  • Virtual DOS machine — (VDM) is Microsoft s technology that allows running legacy DOS and 16 bit Windows programs on Intel 80386 or higher computers when there is already another operating system running and controlling the hardware. Contents 1 Overview 2 NTVDM 3… …   Wikipedia

  • Stride — can stand for: * STRIDE (MALAYSIA),Science And Technology Research Institute For Defence * A step (ie. part of walking) * In music: ** STRIDE An indie rock n roll band from North East Scotland ** Stride (music), a type of piano playing ** Stride… …   Wikipedia

  • SafeDisc — is a CD/DVD copy prevention and digital rights management program for Windows applications and games, developed by Macrovision Corporation, aiming to prevent software copying, as well as resisting home media duplication devices, professional… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.