GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
13:18 Sep 22, 2019 |
English to Dutch translations [PRO] Tech/Engineering - IT (Information Technology) | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Kitty Brussaard Netherlands Local time: 08:13 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
5 | gebrek aan een adequaat ddetectievermogen |
| ||
3 +2 | onderscheidingsvermogen |
|
gebrek aan een adequaat ddetectievermogen Explanation: 'dat de doelen gebrek hadden aan een adequaat detectievermogen' Het woord 'discernment' kan op verschillende manieren geïnterpreteerd worden: onderscheid maken of iets detecteren of in schatten, zowel in visueel als mentaal opzicht. In deze context hebben de doelen van de aanval niet het adequate vermogen om aanvallen op tijd te detecteren. -------------------------------------------------- Note added at 2 hrs (2019-09-22 16:04:43 GMT) -------------------------------------------------- *detectievermogen https://www.oxfordlearnersdictionaries.com/definition/english/discernment https://www.merriam-webster.com/dictionary/discern |
| |
Login to enter a peer comment (or grade) |
discernment onderscheidingsvermogen Explanation: Als het hier gaat om doelwitten ('targets') in de zin van gebruikers, zou ik kiezen voor 'onderscheidingsvermogen'. Denk bijv. aan aanvallen in de vorm van phishing waarbij gebruikers (met het oog) onderscheid moeten kunnen maken tussen verdachte e-mails en e-mails van betrouwbare afzenders. 'Detectievermogen' associeer ik eerder met antivirussoftware, firewalls etc. -------------------------------------------------- Note added at 5 days (2019-09-27 13:49:35 GMT) -------------------------------------------------- Online environments, including email and social media platforms, are continuously threatened by malicious content designed by attackers to install malware on unsuspecting users and/or phish them into revealing sensitive data about themselves. Often slipping past technical mitigations (e.g. spam filters), attacks target the human element and seek to elicit trust as a means of achieving their nefarious ends. Victimized end-users lack the discernment, visual acuity, training, and/or experience to correctly identify the nefarious antecedents of trust that should prompt suspicion. https://aisel.aisnet.org/hicss-51/da/behavioral_data_analyti... |
| |
Grading comment
| ||
Login or register (free and only takes a few minutes) to participate in this question. You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy. KudoZ™ translation helpThe KudoZ network provides a framework for translators and others to assist each other with translations or explanations of terms and short phrases.
See also: Search millions of term translations Your current localization setting
English
Select a language Close search
|