• 网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    youdao

  • 首先系统漏洞潜在攻击攻击目的可能导致的后果等进行安全风险分析评估

    First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.

    youdao

  • 网络安全评价复杂系统工程现有安全评估工具大都只是用于对网络系统安全漏洞进行扫描检测

    Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.

    youdao

  • 传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    youdao

  • 当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    youdao

  • 本文概述了目前安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。

    This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).

    youdao

  • 利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    youdao

  • 利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定