TERMIUM Plus®
From: Translation Bureau
On social media
Consult the Government of Canada’s terminology data bank.
LEGITIMATE CODE [7 records]
Record 1 - internal organization data 2026-04-30
Record 1, English
Record 1, Subject field(s)
- IT Security
- Information Technology (Informatics)
Record 1, Main entry term, English
- Quick Response code phishing
1, record 1, English, Quick%20Response%20code%20phishing
correct, noun
Record 1, Abbreviations, English
Record 1, Synonyms, English
- QR code phishing 2, record 1, English, QR%20code%20phishing
correct, noun
- QR phishing 3, record 1, English, QR%20phishing
correct, noun
- quishing 4, record 1, English, quishing
correct, noun
Record 1, Textual support, English
Record number: 1, Textual support number: 1 CONT
... there has been a rise in the number of phishing campaigns utilizing [Quick Response(QR) ] codes, which is referred to as QR code phishing or quishing. Quishing often involves sending an urgent or threatening email with a QR code embedded that directs users to malicious websites. These websites typically spoof legitimate company websites and then ask users to input private information like log-in credentials, banking information, or credit card details. 3, record 1, English, - Quick%20Response%20code%20phishing
Record 1, French
Record 1, Domaine(s)
- Sécurité des TI
- Technologie de l'information (Informatique)
Record 1, Main entry term, French
- hameçonnage par code QR
1, record 1, French, hame%C3%A7onnage%20par%20code%20QR
correct, see observation, masculine noun
Record 1, Abbreviations, French
Record 1, Synonyms, French
- quishing 1, record 1, French, quishing
avoid, anglicism, masculine noun
Record 1, Textual support, French
Record number: 1, Textual support number: 1 CONT
Hameçonnage par code QR [...] : Les auteures et auteurs de menace peuvent placer un code QR dans un courriel d'hameçonnage ou utiliser un tel code pour diriger les utilisatrices et utilisateurs vers un site Web d'hameçonnage qui les incite à dévoiler leurs renseignements personnels. 2, record 1, French, - hame%C3%A7onnage%20par%20code%20QR
Record number: 1, Textual support number: 1 OBS
hameçonnage par code QR : «QR» est l'abréviation du terme anglais «Quick Response». 3, record 1, French, - hame%C3%A7onnage%20par%20code%20QR
Record 1, Spanish
Record 1, Textual support, Spanish
Record 2 - internal organization data 2023-04-24
Record 2, English
Record 2, Subject field(s)
- IT Security
- Testing and Debugging
Record 2, Main entry term, English
- virus attack point
1, record 2, English, virus%20attack%20point
correct
Record 2, Abbreviations, English
Record 2, Synonyms, English
- attack point 1, record 2, English, attack%20point
correct
- point of attack 1, record 2, English, point%20of%20attack
correct
Record 2, Textual support, English
Record number: 2, Textual support number: 1 CONT
How can a virus penetrate a computer? On a PC [personal computer], the attack points are most easily listed by analysing the steps which are performed when the PC is started (bootstrapped), either by switching it on, or by performing a so-called "warm boot" .... 2, record 2, English, - virus%20attack%20point
Record number: 2, Textual support number: 1 OBS
A virus cannot penetrate a computer unless given a chance to execute first. Since executable objects on a PC are known, it is easy to list all virus attack points. A system will be protected against contamination by making sure it executes only legitimate, virus-free code. 3, record 2, English, - virus%20attack%20point
Record 2, French
Record 2, Domaine(s)
- Sécurité des TI
- Test et débogage
Record 2, Main entry term, French
- point d'attaque du virus
1, record 2, French, point%20d%27attaque%20du%20virus
correct, masculine noun
Record 2, Abbreviations, French
Record 2, Synonyms, French
- point d'attaque 1, record 2, French, point%20d%27attaque
correct, masculine noun
Record 2, Textual support, French
Record number: 2, Textual support number: 1 CONT
Comment un virus peut-il pénétrer dans un ordinateur? Sur un PC [ordinateur individuel], on détermine plus facilement les points d'attaque en analysant les opérations qui s'exécutent lors du lancement du PC (initialisation), soit en le mettant en service, soit en exécutant une «initialisation à chaud» [...] 2, record 2, French, - point%20d%27attaque%20du%20virus
Record number: 2, Textual support number: 1 OBS
Un virus ne peut pénétrer dans un ordinateur sans d'abord s'exécuter. Tous les objets exécutables d'un PC étant connus, il est possible de répertorier les points d'attaque du virus. En ne permettant que la seule exécution des codifications légitimes exemptes de virus, on se dotera d'une bonne protection contre les infections. 3, record 2, French, - point%20d%27attaque%20du%20virus
Record 2, Spanish
Record 2, Campo(s) temático(s)
- Seguridad de IT
- Prueba y depuración
Record 2, Main entry term, Spanish
- punto de ataque
1, record 2, Spanish, punto%20de%20ataque
correct, masculine noun
Record 2, Abbreviations, Spanish
Record 2, Synonyms, Spanish
Record 2, Textual support, Spanish
Record 3 - internal organization data 2022-01-26
Record 3, English
Record 3, Subject field(s)
- Advertising
- IT Security
Record 3, Main entry term, English
- malvertising
1, record 3, English, malvertising
correct
Record 3, Abbreviations, English
Record 3, Synonyms, English
Record 3, Textual support, English
Record number: 3, Textual support number: 1 CONT
Malvertising is an attack in which perpetrators inject malicious code into legitimate online advertising networks. 2, record 3, English, - malvertising
Record 3, Key term(s)
- malvertizing
Record 3, French
Record 3, Domaine(s)
- Publicité
- Sécurité des TI
Record 3, Main entry term, French
- publicité malveillante
1, record 3, French, publicit%C3%A9%20malveillante
correct, feminine noun
Record 3, Abbreviations, French
Record 3, Synonyms, French
- malvertising 2, record 3, French, malvertising
avoid, anglicism, masculine noun
Record 3, Textual support, French
Record number: 3, Textual support number: 1 CONT
[La] publicité malveillante consiste à utiliser des annonces en ligne pour infecter des ordinateurs avec différents types de programmes malveillants. 2, record 3, French, - publicit%C3%A9%20malveillante
Record 3, Key term(s)
- malvertizing
Record 3, Spanish
Record 3, Textual support, Spanish
Record 4 - internal organization data 2021-02-24
Record 4, English
Record 4, Subject field(s)
- Risks and Threats (Security)
- IT Security
- Internet and Telematics
Record 4, Main entry term, English
- browser-based exploitation
1, record 4, English, browser%2Dbased%20exploitation
correct
Record 4, Abbreviations, English
Record 4, Synonyms, English
Record 4, Textual support, English
Record number: 4, Textual support number: 1 DEF
A misuse of legitimate browser components to execute malicious code. 1, record 4, English, - browser%2Dbased%20exploitation
Record number: 4, Textual support number: 1 OBS
Simply visiting a website with hidden malicious code can result in exploitation. 1, record 4, English, - browser%2Dbased%20exploitation
Record 4, French
Record 4, Domaine(s)
- Risques et menaces (Sécurité)
- Sécurité des TI
- Internet et télématique
Record 4, Main entry term, French
- exploitation sur navigateur
1, record 4, French, exploitation%20sur%20navigateur
correct, feminine noun
Record 4, Abbreviations, French
Record 4, Synonyms, French
Record 4, Textual support, French
Record number: 4, Textual support number: 1 DEF
Usage abusif des composants d'un navigateur Web légitime aux fins d'exécution de code malveillant. 1, record 4, French, - exploitation%20sur%20navigateur
Record number: 4, Textual support number: 1 OBS
La simple visite d'un site Web contenant du code malveillant caché peut donner lieu à une exploitation. 1, record 4, French, - exploitation%20sur%20navigateur
Record 4, Spanish
Record 4, Textual support, Spanish
Record 5 - internal organization data 2018-06-27
Record 5, English
Record 5, Subject field(s)
- IT Security
- Software
Record 5, Main entry term, English
- legitimate code
1, record 5, English, legitimate%20code
correct
Record 5, Abbreviations, English
Record 5, Synonyms, English
Record 5, Textual support, English
Record number: 5, Textual support number: 1 CONT
As with logic bombs, back doors can be placed into legitimate code or be standalone programs. 2, record 5, English, - legitimate%20code
Record 5, French
Record 5, Domaine(s)
- Sécurité des TI
- Logiciels
Record 5, Main entry term, French
- code légitime
1, record 5, French, code%20l%C3%A9gitime
correct, masculine noun
Record 5, Abbreviations, French
Record 5, Synonyms, French
Record 5, Textual support, French
Record number: 5, Textual support number: 1 CONT
Cependant, [l'expert] a constaté que le mécanisme utilisé par la plupart des produits pour vérifier les signatures numériques est trivial à contourner, permettant à des fichiers malveillants d’être associés à un code légitime signé Apple pour que le malware ressemble effectivement à Apple. 1, record 5, French, - code%20l%C3%A9gitime
Record 5, Spanish
Record 5, Textual support, Spanish
Record 6 - internal organization data 2017-01-13
Record 6, English
Record 6, Subject field(s)
- Titles of Laws and Regulations
- Communication and Information Management
- Security
Record 6, Main entry term, English
- Code of Fair Information Practices
1, record 6, English, Code%20of%20Fair%20Information%20Practices
Canada
Record 6, Abbreviations, English
Record 6, Synonyms, English
Record 6, Textual support, English
Record number: 6, Textual support number: 1 OBS
The Privacy Act takes a life-cycle approach to the management of personal information. Sections 4 through 8, referred to as the "Code of Fair Information Practices, "restrict the collection of personal information and limits how that information, once collected, can be used and disclosed. It balances the legitimate collection and use requirements essential to many federal government programs with the right to a reasonable expectation of privacy. 1, record 6, English, - Code%20of%20Fair%20Information%20Practices
Record 6, French
Record 6, Domaine(s)
- Titres de lois et de règlements
- Gestion des communications et de l'information
- Sécurité
Record 6, Main entry term, French
- Code de pratiques équitables en matière de renseignements
1, record 6, French, Code%20de%20pratiques%20%C3%A9quitables%20en%20mati%C3%A8re%20de%20renseignements
masculine noun, Canada
Record 6, Abbreviations, French
Record 6, Synonyms, French
Record 6, Textual support, French
Record number: 6, Textual support number: 1 OBS
La Loi sur la protection des renseignements personnels adopte l'approche du cycle de vie pour la gestion des renseignements personnels. Les articles 4 à 8, désignés sous le nom de «Code de pratiques équitables en matière de renseignements», imposent des limites à la collecte de renseignements personnels et à la façon dont l'information, une fois recueillie, peut être utilisée et communiquée. Ils établissent un équilibre entre les besoins légitimes de collecte et d'utilisation de nombreux programmes fédéraux et le droit d'avoir des attentes raisonnables quant à la protection de la vie privée. 1, record 6, French, - Code%20de%20pratiques%20%C3%A9quitables%20en%20mati%C3%A8re%20de%20renseignements
Record 6, Spanish
Record 6, Textual support, Spanish
Record 7 - internal organization data 1993-02-18
Record 7, English
Record 7, Subject field(s)
- IT Security
Record 7, Main entry term, English
- potential virus carrier
1, record 7, English, potential%20virus%20carrier
correct
Record 7, Abbreviations, English
Record 7, Synonyms, English
Record 7, Textual support, English
Record number: 7, Textual support number: 1 CONT
In order to penetrate a computer, a virus must be given a chance to execute. Since executable objects on a PC are known, all virus attack points can be listed. By making sure that the system executes only legitimate, virus-free code, the system will be protected from infection. In addition to the obvious executable files... any file which contains executable code has to be treated as a potential virus carrier. 1, record 7, English, - potential%20virus%20carrier
Record 7, French
Record 7, Domaine(s)
- Sécurité des TI
Record 7, Main entry term, French
- vecteur potentiel de virus
1, record 7, French, vecteur%20potentiel%20de%20virus
correct, masculine noun
Record 7, Abbreviations, French
Record 7, Synonyms, French
Record 7, Textual support, French
Record number: 7, Textual support number: 1 CONT
Pour pouvoir pénétrer dans un ordinateur, il faut qu'un virus ait la possibilité de s'exécuter. Étant donné que l'on connaît les objets exécutables d'un PC, tous les points d'attaque du virus peuvent être recensés. On protégera le système contre les infections en faisant en sorte que seules soient exécutées les codifications légitimes ne contenant pas de virus. En plus des fichiers exécutables évidents [...] tout fichier qui contient une codification exécutable doit être traité comme un vecteur potentiel de virus. 1, record 7, French, - vecteur%20potentiel%20de%20virus
Record 7, Spanish
Record 7, Textual support, Spanish
Copyright notice for the TERMIUM Plus® data bank
© Public Services and Procurement Canada, 2026
TERMIUM Plus®, the Government of Canada's terminology and linguistic data bank
A product of the Translation Bureau
Features
GCtranslate (available on the Government of Canada network only)
Use this artificial intelligence prototype to translate Government of Canada content up to and including Protected B. Available to employees of selected departments and agencies only.
Writing tools
The Language Portal’s writing tools have a new look! Easy to consult, they give you access to a wealth of information that will help you write better in English and French.
Glossaries and vocabularies
Access Translation Bureau glossaries and vocabularies.
- Date Modified:


