TERMIUM Plus®
From: Translation Bureau
On social media
Consult the Government of Canada’s terminology data bank.
LEGITIMATE USER [10 records]
Record 1 - internal organization data 2018-10-25
Record 1, English
Record 1, Subject field(s)
- Communication and Information Management
- Security
- IT Security
Record 1, Main entry term, English
- online authentication
1, record 1, English, online%20authentication
correct
Record 1, Abbreviations, English
Record 1, Synonyms, English
- electronic authentication 2, record 1, English, electronic%20authentication
correct
- digital authentication 3, record 1, English, digital%20authentication
correct
- e-authentication 3, record 1, English, e%2Dauthentication
correct
Record 1, Textual support, English
Record number: 1, Textual support number: 1 DEF
The process by which an individual(a person, an organization or device) is verified as a unique and legitimate user. 4, record 1, English, - online%20authentication
Record 1, Key term(s)
- on-line authentication
Record 1, French
Record 1, Domaine(s)
- Gestion des communications et de l'information
- Sécurité
- Sécurité des TI
Record 1, Main entry term, French
- authentification en ligne
1, record 1, French, authentification%20en%20ligne
correct, feminine noun
Record 1, Abbreviations, French
Record 1, Synonyms, French
- authentification électronique 2, record 1, French, authentification%20%C3%A9lectronique
correct, feminine noun
Record 1, Textual support, French
Record number: 1, Textual support number: 1 DEF
Processus par lequel on vérifie qu'un individu (une personne, une organisation ou un dispositif) est l'utilisateur unique et légitime. 3, record 1, French, - authentification%20en%20ligne
Record number: 1, Textual support number: 1 OBS
authentification en ligne : terme tiré du mini-lexique «Cyberespace et droit» et reproduit avec l'autorisation du Centre de ressources en français juridique de l'Université de Saint-Boniface. 4, record 1, French, - authentification%20en%20ligne
Record 1, Spanish
Record 1, Textual support, Spanish
Record 2 - internal organization data 2016-02-03
Record 2, English
Record 2, Subject field(s)
- IT Security
Record 2, Main entry term, English
- online guessing attack
1, record 2, English, online%20guessing%20attack
correct
Record 2, Abbreviations, English
Record 2, Synonyms, English
- online guessing 1, record 2, English, online%20guessing
correct
Record 2, Textual support, English
Record number: 2, Textual support number: 1 DEF
[An attack in which] an unauthorized party connects to the verifier online and attempts to guess a secret token(e. g., password) with the goal of posing as the legitimate user. 1, record 2, English, - online%20guessing%20attack
Record 2, French
Record 2, Domaine(s)
- Sécurité des TI
Record 2, Main entry term, French
- tentative de deviner en ligne
1, record 2, French, tentative%20de%20deviner%20en%20ligne
correct, feminine noun
Record 2, Abbreviations, French
Record 2, Synonyms, French
Record 2, Textual support, French
Record number: 2, Textual support number: 1 DEF
[Attaque par laquelle] une personne non autorisée se connecte au vérificateur en ligne et tente de deviner un jeton secret (p. ex., un mot de passe) avec l'intention d'usurper l'identité de l'utilisateur légitime. 1, record 2, French, - tentative%20de%20deviner%20en%20ligne
Record 2, Spanish
Record 2, Textual support, Spanish
Record 3 - internal organization data 2010-03-01
Record 3, English
Record 3, Subject field(s)
- IT Security
Record 3, Main entry term, English
- unsuspecting user
1, record 3, English, unsuspecting%20user
correct
Record 3, Abbreviations, English
Record 3, Synonyms, English
Record 3, Textual support, English
Record number: 3, Textual support number: 1 CONT
Trojan horses are often used as a means of infecting an unsuspecting user with a virus. If a legitimate program becomes infected with a virus, it becomes a Trojan horse and if a user executes it in the belief that he is executing a bonafide copy, his computer will become infected. 1, record 3, English, - unsuspecting%20user
Record 3, French
Record 3, Domaine(s)
- Sécurité des TI
Record 3, Main entry term, French
- utilisateur peu méfiant
1, record 3, French, utilisateur%20peu%20m%C3%A9fiant
correct, masculine noun
Record 3, Abbreviations, French
Record 3, Synonyms, French
- utilisateur non méfiant 1, record 3, French, utilisateur%20non%20m%C3%A9fiant
correct, masculine noun
Record 3, Textual support, French
Record number: 3, Textual support number: 1 CONT
Les Chevaux de Troie servent souvent à infecter un utilisateur peu méfiant. Si un programme normal est contaminé par un virus, il devient lui-même un Cheval de Troie et si un utilisateur l'exécute en pensant exécuter une copie correcte, son ordinateur sera infecté. 1, record 3, French, - utilisateur%20peu%20m%C3%A9fiant
Record 3, Spanish
Record 3, Textual support, Spanish
Record 4 - internal organization data 2010-03-01
Record 4, English
Record 4, Subject field(s)
- IT Security
Record 4, Main entry term, English
- infect a user
1, record 4, English, infect%20a%20user
proposal
Record 4, Abbreviations, English
Record 4, Synonyms, English
Record 4, Textual support, English
Record number: 4, Textual support number: 1 OBS
Trojan horses are often used as a means of infecting an unsuspecting user with a virus. If a legitimate program becomes infected with a virus, it becomes a Trojan horse and if a user executes it in the belief that he is executing a bonafide copy, his computer will become infected. 2, record 4, English, - infect%20a%20user
Record 4, French
Record 4, Domaine(s)
- Sécurité des TI
Record 4, Main entry term, French
- infecter un utilisateur
1, record 4, French, infecter%20un%20utilisateur
correct
Record 4, Abbreviations, French
Record 4, Synonyms, French
Record 4, Textual support, French
Record number: 4, Textual support number: 1 CONT
Les Chevaux de Troie servent souvent à infecter un utilisateur peu méfiant. Si un programme normal est contaminé par un virus, il devient lui-même un Cheval de Troie et si un utilisateur l'exécute en pensant exécuter une copie correcte, son ordinateur sera infecté. 1, record 4, French, - infecter%20un%20utilisateur
Record 4, Spanish
Record 4, Textual support, Spanish
Record 5 - internal organization data 2010-03-01
Record 5, English
Record 5, Subject field(s)
- IT Security
Record 5, Main entry term, English
- infected with a virus
1, record 5, English, infected%20with%20a%20virus
correct
Record 5, Abbreviations, English
Record 5, Synonyms, English
Record 5, Textual support, English
Record number: 5, Textual support number: 1 CONT
Trojan horses are often used as a means of infecting an unsuspecting user with a virus. If a legitimate program becomes infected with a virus, it becomes a Trojan horse and if a user executes it in the belief that he is executing a bonafide copy, his computer will become infected. 1, record 5, English, - infected%20with%20a%20virus
Record 5, French
Record 5, Domaine(s)
- Sécurité des TI
Record 5, Main entry term, French
- contaminé par un virus
1, record 5, French, contamin%C3%A9%20par%20un%20virus
correct
Record 5, Abbreviations, French
Record 5, Synonyms, French
- infecté par un virus 2, record 5, French, infect%C3%A9%20par%20un%20virus
proposal
Record 5, Textual support, French
Record number: 5, Textual support number: 1 CONT
Les Chevaux de Troie servent souvent à infecter un utilisateur peu méfiant. Si un programme normal est contaminé par un virus, il devient lui-même un Cheval de Troie et si un utilisateur l'exécute en pensant exécuter une copie correcte, son ordinateur sera infecté. 1, record 5, French, - contamin%C3%A9%20par%20un%20virus
Record 5, Spanish
Record 5, Textual support, Spanish
Record 6 - internal organization data 2010-03-01
Record 6, English
Record 6, Subject field(s)
- IT Security
Record 6, Main entry term, English
- infect an unsuspecting user
1, record 6, English, infect%20an%20unsuspecting%20user
proposal
Record 6, Abbreviations, English
Record 6, Synonyms, English
Record 6, Textual support, English
Record number: 6, Textual support number: 1 OBS
Trojan horses are often used as a means of infecting an unsuspecting user with a virus. If a legitimate program becomes infected with a virus, it becomes a Trojan horse and if a user executes it in the belief that he is executing a bonafide copy, his computer will become infected. 2, record 6, English, - infect%20an%20unsuspecting%20user
Record 6, French
Record 6, Domaine(s)
- Sécurité des TI
Record 6, Main entry term, French
- infecter un utilisateur peu méfiant
1, record 6, French, infecter%20un%20utilisateur%20peu%20m%C3%A9fiant
correct
Record 6, Abbreviations, French
Record 6, Synonyms, French
Record 6, Textual support, French
Record number: 6, Textual support number: 1 CONT
Les Chevaux de Troie servent souvent à infecter un utilisateur peu méfiant. Si un programme normal est contaminé par un virus, il devient lui-même un Cheval de Troie et si un utilisateur l'exécute en pensant exécuter une copie correcte, son ordinateur sera infecté. 1, record 6, French, - infecter%20un%20utilisateur%20peu%20m%C3%A9fiant
Record 6, Spanish
Record 6, Textual support, Spanish
Record 7 - internal organization data 2006-04-05
Record 7, English
Record 7, Subject field(s)
- Internet and Telematics
- IT Security
Record 7, Main entry term, English
- evil twin attack
1, record 7, English, evil%20twin%20attack
correct
Record 7, Abbreviations, English
Record 7, Synonyms, English
- access point phishing 1, record 7, English, access%20point%20phishing
correct
- AP phishing 1, record 7, English, AP%20phishing
correct
Record 7, Textual support, English
Record number: 7, Textual support number: 1 CONT
... access point(AP) phishing is a technique whereby an attacker tricks victims into connecting to a laptop or PDA [personal digital assistant] by posing as a legitimate hotspot. Once the user is connected, the user is coerced into downloading a series of custom written Trojans and viruses. 1, record 7, English, - evil%20twin%20attack
Record 7, French
Record 7, Domaine(s)
- Internet et télématique
- Sécurité des TI
Record 7, Main entry term, French
- hameçonnage au point d'accès
1, record 7, French, hame%C3%A7onnage%20au%20point%20d%27acc%C3%A8s
proposal, masculine noun
Record 7, Abbreviations, French
Record 7, Synonyms, French
Record 7, Textual support, French
Record 7, Spanish
Record 7, Textual support, Spanish
Record 8 - external organization data 2006-03-29
Record 8, English
Record 8, Subject field(s)
- Compartment - ISO/IEC JTC 1 Information Technology Vocabulary
Universal entry(ies) Record 8
Record 8, Main entry term, English
- between-the-lines entry
1, record 8, English, between%2Dthe%2Dlines%20entry
correct, standardized
Record 8, Abbreviations, English
Record 8, Synonyms, English
Record 8, Textual support, English
Record number: 8, Textual support number: 1 DEF
access obtained through active wiretapping by an unauthorized user to a momentarily inactive transmission channel connected to a legitimate user resource 1, record 8, English, - between%2Dthe%2Dlines%20entry
Record number: 8, Textual support number: 1 OBS
between-the-lines entry: term and definition standardized by ISO/IEC [ISO/IEC 2382-8:1998]. 2, record 8, English, - between%2Dthe%2Dlines%20entry
Record 8, French
Record 8, Domaine(s)
- Tiroir - ISO/CEI JTC 1 Vocabulaire des technologies de l'information
Entrée(s) universelle(s) Record 8
Record 8, Main entry term, French
- accès par infiltration
1, record 8, French, acc%C3%A8s%20par%20infiltration
correct, masculine noun, standardized
Record 8, Abbreviations, French
Record 8, Synonyms, French
- faufilage 1, record 8, French, faufilage
correct, masculine noun, standardized
Record 8, Textual support, French
Record number: 8, Textual support number: 1 DEF
accès obtenu par une entité non autorisée qui effectue un branchement clandestin actif sur une voie de communication de données temporairement inactive, reliée à une ressource d'une entité légitime 1, record 8, French, - acc%C3%A8s%20par%20infiltration
Record number: 8, Textual support number: 1 OBS
accès par infiltration; faufilage : termes et définition normalisés par l'ISO/CEI [ISO/IEC 2382-8:1998]. 2, record 8, French, - acc%C3%A8s%20par%20infiltration
Record 8, Spanish
Record 8, Textual support, Spanish
Record 9 - internal organization data 1998-04-22
Record 9, English
Record 9, Subject field(s)
- IT Security
Record 9, Main entry term, English
- between-the-lines entry
1, record 9, English, between%2Dthe%2Dlines%20entry
correct
Record 9, Abbreviations, English
Record 9, Synonyms, English
Record 9, Textual support, English
Record number: 9, Textual support number: 1 DEF
Access obtained through active wiretapping by an unauthorized user to a momentarily inactive transmission channel connected to a legitimate user resource. 1, record 9, English, - between%2Dthe%2Dlines%20entry
Record 9, French
Record 9, Domaine(s)
- Sécurité des TI
Record 9, Main entry term, French
- accès par infiltration
1, record 9, French, acc%C3%A8s%20par%20infiltration
correct
Record 9, Abbreviations, French
Record 9, Synonyms, French
- faufilage 1, record 9, French, faufilage
correct
Record 9, Textual support, French
Record number: 9, Textual support number: 1 DEF
Accès obtenu par une entité non autorisée qui effectue un branchement clandestin actif sur une voie de communication de données temporairement inactive, reliée à une ressource d'une entité légitime. 1, record 9, French, - acc%C3%A8s%20par%20infiltration
Record 9, Spanish
Record 9, Textual support, Spanish
Record 10 - internal organization data 1994-01-06
Record 10, English
Record 10, Subject field(s)
- Copyright
- Software
Record 10, Main entry term, English
- legitimate user
1, record 10, English, legitimate%20user
correct
Record 10, Abbreviations, English
Record 10, Synonyms, English
Record 10, Textual support, English
Record number: 10, Textual support number: 1 CONT
... the original that belongs to the person making the private copy or of which he is the legitimate user. 1, record 10, English, - legitimate%20user
Record 10, French
Record 10, Domaine(s)
- Droits d'auteur
- Logiciels
Record 10, Main entry term, French
- utilisateur légitime
1, record 10, French, utilisateur%20l%C3%A9gitime
correct, masculine noun
Record 10, Abbreviations, French
Record 10, Synonyms, French
Record 10, Textual support, French
Record number: 10, Textual support number: 1 CONT
[...] exemplaire qui appartient à celui qui fait la copie privée ou dont il est l'utilisateur légitime. 1, record 10, French, - utilisateur%20l%C3%A9gitime
Record 10, Spanish
Record 10, Textual support, Spanish
Copyright notice for the TERMIUM Plus® data bank
© Public Services and Procurement Canada, 2026
TERMIUM Plus®, the Government of Canada's terminology and linguistic data bank
A product of the Translation Bureau
Features
GCtranslate (available on the Government of Canada network only)
Use this artificial intelligence prototype to translate Government of Canada content up to and including Protected B. Available to employees of selected departments and agencies only.
Writing tools
The Language Portal’s writing tools have a new look! Easy to consult, they give you access to a wealth of information that will help you write better in English and French.
Glossaries and vocabularies
Access Translation Bureau glossaries and vocabularies.
- Date Modified:


