Consider establishing a newsfeed for new threats and vulnerabilities.
可以考虑通过新闻feed了解新的威胁和漏洞。
The fourth category is evaluating software security and vulnerabilities.
第四类是软件安全漏洞评估。
They are ask users to “treat it with a sceptical eye, and report bugs and vulnerabilities.”
他们要求用户要带着怀疑的眼光来使用,并随时报告使用中的故障和弱点。
Threats and vulnerabilities are classified under confidentiality, integrity, and availability.
威胁和弱点在机密性、完整性和可用性中是分级的。
Of course, UAS use in urban environments does not come without some risks and vulnerabilities.
当然,UAS在城市巷战中并非毫无风险和弱点。
This will enable the supervisors to better monitor risks and vulnerabilities in the corporate sector.
这将使监管人员可以更好地监测公司部门的风险和弱点。
Counsel can address risks and vulnerabilities that arise from changes in the technical, business and legal environments.
法律顾问可以探讨由于技术,业务及法律环境的变化而产生的风险和弱点。
Risk assessment is the process of identifying assets, threats, and vulnerabilities, measuring risks and the prioritizing risks.
风险评估是标识资产、威胁和漏洞并度量风险和对风险进行优先排序的过程。
Sites such as Security Focus (see Resources) collect information on a number of exploits and vulnerabilities and are worth watching.
SecurityFocus(参见参考资料)之类的站点收集了大量有关攻击和安全漏洞的信息,值得一看。
This process introduces latent defects and vulnerabilities into our implementations, which accumulate in the form of growing potential risk.
此过程在我们的实现中引入了潜在缺陷和漏洞,并以不断增加的潜在风险的形式积累。
Taking a deeper look at threats and vulnerabilities, he cautions on the possibility of information being compromised without proper safeguards in place.
通过对威胁和脆弱点的深入观察,他提醒人们,缺乏适当的保护可能会造成信息破坏。
Assessment of threats to, impacts on and vulnerabilities of information and information processing facilities and the likelihood of their occurrence.
对信息和信息处理设施的危害、影响和薄弱点及三者发生的可能性的评估。
It is important to recognize that a small but significant number of thinkers were willing to think outside the box and were aware of many risks and vulnerabilities.
重要的是承认有一小部分思考者愿意打破常规思考问题,并觉察到许多风险和漏洞。
Identify potential threats and vulnerabilities for business processes, associated data and supporting capabilities to assist in the evaluation of enterprise risk.
识别出潜在的威胁和危险的业务过程、相关数据和支撑能力的帮助评估企业风险。
As shown in Figure 1, you need the Risk analysis orchestrator to update ever-growing complexity of repositories of assets, threats, and vulnerabilities across the SOAs.
如图1中所示,您需要风险分析协调器来更新由SOA上的资产、威胁和漏洞组成的存储库的不断增长的复杂性。
Of course, Linux also gets attacked less frequently by viruses and malware, and vulnerabilities tend be found and fixed more quickly by its legions of developers and users.
当然,Linux也较少受到病毒和恶意软件的攻击,而且其系统漏洞往往都能被即时发现,开发者和用户所组成的快速军团也能迅速地修复这些漏洞。
No matter how well you change code in the Ajax format to make it more bandwidth efficient, there will be always risks and vulnerabilities you'll need to watch out for and mitigate.
无论怎样修改Ajax代码来提高带宽效率,始终存在一些风险和漏洞,需要您进行监视并解决。
In other words, it was not a random drawing from a distribution of events with a fat tail but actually predictable in advance given the rising macro and financial risks and vulnerabilities.
换句话说,它并非带有肥尾的一系列离散事件的随机结果,而是在事先观察到上升的宏观及金融风险后完全可以预见到的。
No matter how well you can change the codes in an Ajax application to make it more bandwidth efficient, there will be always risks and vulnerabilities you'll need to watch out for and mitigate.
无论怎样修改Ajax代码来提高带宽效率,始终存在一些风险和漏洞,需要您进行监视并解决。
It can enumerate product names and vulnerabilities, including software flaws and configuration problems, identify the presence of vulnerabilities and assign severity scores to software flaws.
它可以列举产品名称和脆弱性,包括软件的漏洞和配置问题,找出存在的漏洞,并分配软件缺陷严重分值。
The probability that a damaging impact will occur is not easy to determine as it requires the coincidence of one or more threats and vulnerabilities, which are themselves generally unpredictable.
发生破坏影响的可能性之所以不容易确定,是因为它需要一个或更多的威胁和弱点的同时发生,通常它们自己都是不可预测的。
The SSRM helps to address the security requirements of the SOA due to increased exposure to risks and vulnerabilities of loose coupling of the services and operations across organizational boundaries.
SSRM帮助处理SOA的安全需求,由于服务和操作跨组织的边界松散耦合,增加了风险和漏洞的暴露,从而导致了这些安全需求。
Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.
今年几起严重的客户和雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统和业务流程,以寻找可能存在的安全隐患。
New vulnerabilities and new threats emerge.
出现了新漏洞和新威胁。
With this information in hand, you can then check these vulnerabilities and defend against them.
有了这些信息,就可以检查这些漏洞并进行防御。
By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.
蠕虫的定义如下,蠕虫是一个自包含软件组件,可以自动执行可识别和攻击目标系统漏洞的探测操作。
Some of the negative consequences include: user frustration, slowdowns in performance, and security vulnerabilities.
其中的一些负面影响包括:用户挫折感,性能下降,安全漏洞等。
Scan each system discovered to uncover vulnerabilities, and move toward exploiting the vulnerability.
扫描发现的每个系统,发现漏洞并利用该漏洞。
Scan each system discovered to uncover vulnerabilities, and move toward exploiting the vulnerability.
扫描发现的每个系统,发现漏洞并利用该漏洞。
应用推荐