ABCDEF
1
termposcommenttranslation_akComment_ak
2
2-factor authenticationNoun[Safe Sisters] [AYETA] "Something you know, and something you have." Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.Synonyms: 2FA, two-step verification, multi-factor authentication. (Source: EFF)Mprenu so ahyensode3[Safe Sisters] [AYETA] "De3 wonim ne de3 wow)" Wura system a 3hia wo din ne wo passw3d a obi b3tumi ahunu.
De3 3ma two factor authentication na esan hia s3 wode ahy3nsode3 a 3b3kyer3 s3 ampa, 3y3 woara na worebue.
De3 3tↄ so mmienu ne pr3kop3 kokoamu atwer3de3, a 3ma wo ahy3nsode3 soronko bi a akasanoma no mu akwaa bi de ma wo. Anaa mpoafidie bi awob3tumi de akyer3 s3 3y3 wo na woredi dwuma bi.
Nnwumakuo bi te s3 sikakorabea 3n3 ab33fo ntentan fidie dwumadifoↄ bi tes3 google, Paypal ne twitter nyinaa de mprenu so ahyensode3 di dwuma. (Source: EFF)
3
application gatewayNoun[AYETA] Application Gateway - Applies security mechanisms to specific applications, such as FTP44 and Telnet45 servers. This is very effective, but can impose a performance degradation.
Application GatewayApplication Gateway: 3y3 nhyehy3e3 a 3y3 ahobanbc ma k)mputa ho nkitawodie, ntoho FTP44 3na Telnet45. 3y3 adepa nanso 3tumi ma wo k)mputa no nso nya) haw
4
Brute force attackNoun[AYETA] Brute force attack - A brute force attack simply tries every possible combination of allowed characters until it finds a match. Ntohyɛsoɔ gidigidiDe3 )y3 basabasa y3 di tumi to hy3 obi so y3 ade3 a afa kwan biara so de atwer3de3 pii kabom kosi s3 cb3hunu nea cne no ahyia.
5
Circuit Level GatewayNoun[AYETA]
Circuit Level Gateway - Applies security mechanisms when a TCP46 or UDP47 connection is established. Once the connection has been made, packets can flow between the hosts without further checking.

Circuit Level GatewayCircuit Level Gateway-3y3 ah)banb) mu ns3m tese TCP46 anaa UDP47 nkabom aba so. S3 nkabom no ba so a, nne3ma tumi fa ne kwan so w) nnipa ntam mu a 3hia s3 w)b3hw3 bio.
6
Digital hygiene[AYETA]
Digital Hygiene - Refers to organizing the files on your PC, to locking down your social media accounts, to introducing new apps or technologies to make your digital life easier or more secure. Digital Rights - Digital rights are basically human rights in the Internet era. Encryption - A process that takes a message and makes it unreadable except to a person who knows how to “decrypt” it back into a readable form.

Abɛɛfo kwantenpɔn ahonidieAbɛɛfo kwantenpɔn ahonidie ne sɛ wobɛdi wo kɔmputa ni, na dwumadie biara nso a wobɛdi no, ɛho bɛtwa kama, na ahosuo ne mfonini biara bɛda n’akwan mu nso.
7
Digital SecurityNoun[AYETA]
Digital security- it is a collective term that describes the resources employed to protect people's online identity, data and other asserts.

Ab33fo Ahobanbɔ3y3 ab33fo nhyehy3e3 a 3boa b) onikor) a )redi dwuma no ho ban
8
Digital Security ActorsNoun[AYETA] Digital security Actors - digital security Actors are people who have various initiatives to mitigate the vulnerabilities and risks of journalists and human rights advocatesAbɛɛfo Kwantenpɔn AhobanbɔAb33fo banb)fo) y3 nkur)fo) bi a w) wc adwene suo ahodo) de boa ns3ntwer3foc ho ban.
9
end-to-end encryptionNoun[Tor, Signal] [AYETA] End-to-end encryption ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient. Other forms of encryption may depend on encryption performed by third-parties. That means that those parties have to be trusted with the original text. End-to-end encryption is generally regarded as safer, because it reduces the number of parties who might be able to interfere or break the encryption. (Source: EFF)Nkitahodie nsɛm biara a ɛfiri ɔfa de kɔsi ɔfa bi noNkitahodie nsɛm biara a ɛfiri ɔfa de kɔsi ɔfa bi no, saa nimdeɛ yi dane no kokoa mu nsɛm, de firi nea ɔreto nkra no de kɔma nea ɔregye nsɛm no, na ɔno de ɔte aseɛ. Saa nimdeɛ yi, afoforɔ a aka no deɛ, wɔtaa gyina nea ɔgyina nkyɛn (third party) no so. Asekyerɛ ne sɛ, sɛ woyi nea ɔso nkra ne nea nkra no rekɔ ne hɔ no firi hɔ a, ɛwɔ sɛ onipa biara a ɔka ho no yɛ obi a wogye no die. Suro biara nni saa nimdeɛ yi ho, esiane sɛ ɛhwɛ paa sɛ nnipa biara ntumi nnya ho kwan kɛkɛ.
10
FirewallNoun[AYETA] Firewall - A tool that protects a computer from unwanted connections to or from local
networks and the Internet. A Firewall might have rules that forbid outgoing email, or
connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. Internet shutdown – An Internet shutdown is an intentional disruption of Internet or electronic communications, rendering them inaccessible or effectively unusable, for a specific population or within a location, often to exert control over the flow of information
Gyaban-AfidieGyaban-Afidie a asi kwan ma kump)ta nni tumi di dwuma w) bae3 a w)np3 anaa di3 efiri fie ni ab33fo intan3t so. Agyaban b3 tumi aw) nhyehy3e3 a asi kwan ma wontumi nni dwama w) w3bsaet bi so. Agyaban y3 ahobanb) a adi kan a y3di boa afidie fri w’ani nna so. Y3 betumi nso di asi nnipa kwa ma won nsa tumi ka ab33fo int3an3t no so wo nkwan pii nso. Ab33fo int3an3t no asie- Ab33fo int3an3t no asie y3 se w’ani da ho na wosie ab33fo int3an3t no anaa mfidie ay3di di kasa ndwuma, s3 nia yen nsa ntumi ka anaa yen nfa di dwama pefee ma nnipa dodo w) )man mo anaa bae3 bi senia wonetumi adi w)n nsemmu so tumi.
11
HackNoun[AYETA]
Hack - to gain illegal access to a computer network or system

HackHack : 3y3 kor)no kwan so a y3de di dwuma bone w) k)mputa so.
12
packet filterNoun[AYETA] Packet Filter - Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. Packet FilterPacket Filter - 3hw3 ade3 biarra a aba anaa 3k) w) network ne s3 y3b3gye atom anaa y3b3po no wc nnipa mmara nnyinaso). Packet filtering y3 ade3 a 3mo da hc ma nnipa nanso 3y3 dene s3 wob3hunu.
13
passphraseNoun[KeePassXC] [Signal] [Safe Sisters] [Tella] [AYETA] A passphrase is a kind of password. We use "passphrase" to convey the idea that a password which is a single word is far too short to protect you and a longer phrase is much better. The webcomic XKCD has a good explanation. http://xkcd.com/936/ (Source: EFF)Atomudeɛ nsɛmNtr3nee a y3di b) ab33fo badw3mma afidie 3huban nanso 3mu wa sini ntr3nee dada no. Webcomic XKCD w)mu nkyer3ase3 yie w) http://xkcd.com/936/
14
passwordNoun[Psiphon] [Safe Sisters] [AYETA]
Password- a password is a basic security mechanism that consists of a secret passphrase created using alphabetic, numeric, alphanumeric and symbolic characters, or a combination.

AtomudeɛPassword y3 ntwer3de3 ne nno)ma a y3de tu ab33fo badwiemma afidie so a 3de b) wcn ho ban firi nnocma a 3de chaw ba afidie ne so.
15
password generatorNoun[AYETA]
Password generator - A password generator is a software tool that creates random or customized passwords for users. It helps users create stronger passwords that provide greater security for a given type of access.

Atomudeɛ kɔfabayɛPassword generator: 3y3 nhyehy3e3 a 3tumi ma kwan ma ntwer3de3 ne nno)ma dane ne ho ahodo) 3de boa k)mputa dwumadie 3ne ho banb).
16
Password vaultNoun[AYETA] Password vault - where users manage large numbers of passwords in a secure location. Atomudeɛ danPassword vault- baabi a nnipa hw3 atwer3de3 ank3se w) beae3 a ah)banb) w).
17
physical tokenNoun[AYETA] Physical Token - is a small device that continuously generates codes in the same way that an authentication app on your mobile device would. It works just as well but it has the added downside that you have to keep track of this other device.
Atomudeɛ a woankasa bɛkoraAb)de3 agyinamude3 - y3 ab33fo afidie ketewa a akcso y3 mmara w) kwan so a 3ne ab33fo dwumadie a 3di mu w) wo ab33fo afidie so s3. 3y3 adwuma yie nanso de3 3ka ho a 3ny3 ne s3 3w) s3 wodi ab33fo afidie foforo no akyi.
18
proxy serverNoun[AYETA]
Proxy server - Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

NgyinamuProxy server : 3y3 nhyehy3e3 3si nkratoc kwan 3sane gya network. 3t) da a Proxy server tumi sie network no ader3ss.
19
RansomwareNoun[AYETA]Ransomware - is a type of malware that is designed to block access to all or part of a computer system until a sum of money is paidRansomware3y3 dwumadie be a 3mma k)mputa no di dwuma s3 nea 3s3 na 3twa dwumadie mu gye s3 wotua sika dodo) bi ansa na 3tumi adi dwuma yie bio.
20
spywareNoun[AYETA] Spyware- is a type of malicious software that is installed on a computer device SpywareSpyware : 3y3 k)mputa ho nhyehy3e3 a 3ma kwan ma y3de nnocma bone to k)mputa so.
21
Universal AuthenticationNoun[AYETA]
Universal Authentication - Universal authentication, also known as single sign-on (SSO), is a network identity verification method that allows users to navigate from site to site securely without having to enter identifying information multiple times.

Universal AuthenticationUniversal authentication: y3 san so nim no s3 nsanh) (SSO), 3y3 k)mputa ho nhyehy3e3 a 3ma kwan ma obi tumi di k)mputa hu dwumadie w) kwan a 3mfa )haw biara mma.
22
Virtual Private NetworkNoun[Outline] [Orbot] [Psiphon] [AYETA]
VPN
A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Source: EFF)
Virtual Private Network[Outline] [Orbot] [Psiphon] [AYETA]
VPN
VPN y3 kwan a y3fa so de y3n kompuuta 3ma adwumakuo bi network wↄ ab33fo ntentank3se3 so.
S3 wode VPN di dwuma a, wo kompuuta so nkutahodie nyinaa ka bom y3 baako, na 3kↄ dwumakuo no hↄ, na 3hↄ na wↄdosodoso mu na wↄde kↄ baabi a 3s3 s3 3kↄ.
S3 wohw3 dwumakuo no mu a, 3rekame ay3 s3, wo kompuuta no so dwumadie no fifi dwumakuo no mu na 3reba nanso eebia aa, na 3firi baabi a wote redi dwuma no.
Nnwumakuo de VPN ma wↄn nkorↄfoↄ kwan s3 wↄb3tumi adi dwuma wↄ ab33fo ntentanfiedie so (te s3 afidie a wↄde printi nnwoma).
Wↄtumi nso de VPN yi bu mmra a 3wↄ ab33fo ntentan fidie so. (Source: EFF)
23
web browserNoun[Orbot, Tor, Mailvelope] [AYETA] The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. (Source: EFF)Ab33fo ntentan 3y3 ab33fo dwumadie a y3de hw3 na y3nya w3bsaet. Firefox, Safari,Internet Explorer ne Chrome nyinaa y3 bi. Ab33fo badw3mma nfidie nyinaa ara w) bi.
24
zoom bombingNoun[AYETA]
Zoom bombing - Zoom bombing is where meetings were intruded into by malicious individuals, and causing disruption to conference calls.

Zoom nhyiamu nsɛiɛ3y3 mmer3 biara a nnipab)nefo) twitwa ab33fo nhyiamu anan mu ne w)n nnwumadie titire w)n nkitahodie.