IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
For example, as in a CSRF vulnerability in Google Mail. In this proof-of-concept attack, the victim would have been lured to a web site controlled by the attacker.
例如,GoogleMail的一个CSRF漏洞,在这个概念验证的攻击中,受害者会被引诱到一个被攻击者控制的站点。
But problems resurfaced this month with Google writing in its official blog about hackers exploiting a vulnerability in Internet Explorer to attack some Gmail users.
但是这个月问题有重新出现,google在自己的官方博客里说黑客利用网络浏览器的弱点来伤害gmail用户。
Now that we know the basis of an attack, what can we do to protect ourselves from this vulnerability?
既然我们知道了攻击的基本知识,那么做些什么才能保护我们自己避免这一脆弱性呢?
But the attack, and the vulnerability it exploits, are all too common.
但是这类攻击,以及它所利用的缺陷,都极其常见。
Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.
最后是三个漏洞:一个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞的,最后是利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。
This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.
本文首先研究了智能决策支持系统的体系结构、集成方式和知识库设计,然后对系统漏洞和网络攻击模式进行了深入探讨。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.
攻击分类研究对于系统地分析计算机系统脆弱性和攻击利用的技术方法有着重要的意义,这有助于构造高效的入侵检测方法。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
The paper begins with an analysis in vulnerability risk evaluation, including its theory, attack graph and specialty of vulnerability.
论文从漏洞评估的原理、攻击路径及漏洞本身,提出一种基于攻击路径的漏洞风险评估模型。
This article further investigates system vulnerability and network attack patterns, designs and implements a network attack intelligent decision support systems (NAIDSS).
本文在深入研究系统漏洞和网络攻击模式的基础上,提出与实现了一种面向网络攻击的智能决策支持系统。
Practice with today's idea will help you to understand that vulnerability or invulnerability is the result of your own thoughts. Nothing except your thoughts can attack you.
今天的练习,有助于你了解,不论你是脆弱的或是百害不侵的,都在于你自己的一念之间。
It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.
它通过构造一个有明显安全漏洞的系统来引诱入侵者对其进行攻击,捕获入侵者攻击过程中在蜜罐系统上的活动数据。
OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.
OS扫描是黑客进行OS漏洞攻击的前奏,实时检测OS扫描是防止系统遭受OS漏洞攻击的重要手段。
A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability.
一次完整的攻击过程通常会包括一系列单独的攻击行为,每个攻击行为是对某个系统漏洞(脆弱性)的一次利用。
Network vulnerability and complexity increases the threat and the possibility of attack.
网络的脆弱性和复杂性增加了威胁和攻击的可能性。
Using a vulnerability index and reviewing risks from deliberate and random attack the effectiveness of the sorting methods is then evaluated.
则节点移除后网络的破坏程度可以用最大连通子图的相对大小,全局效率以及脆弱性指标来进行评价。
A human who exploits a vulnerability perpetrates an attack on the system.
人可利用脆弱性对系统进行罪恶的攻击。
You get to know about the vulnerability before others do, so you get a patch before anybody else finds and attack you.
你知道面前的脆弱性别人,所以你得到一个补丁之前,别人发现和攻击你。
The low income crowd's characteristic had decided they facing the risk vulnerability, some small attack have the possibility to make lose anything, therefore they need the risk the transfer method.
低收入人群的特性决定了他们面对风险的脆弱性,一些微小的打击都有可能造成群倾家荡产,所以他们更需要转移风险的方法。
In this paper, we focus on the vulnerability that the administrator account and password are empty, using some basic methods of attack, describing in detail the process of attacks.
利用漏洞对系统进行攻击成为了黑客们惯用本文针对对管理员账号口令为空这一安全漏洞,采用了一些基本的攻击方法,详细地描述了具体地攻击过程。
Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.
脆弱性是复杂网络系统的固有本性,是网络攻防的焦点。
Discovering software vulnerability is an important part of network attack and defense technology.
软件漏洞挖掘是网络攻防技术的重要组成部分。
Discovering software vulnerability is an important part of network attack and defense technology.
软件漏洞挖掘是网络攻防技术的重要组成部分。
应用推荐