• The chapter on threat modeling and risk assessment is particularly important.

    “威建模危险评估一章非常重要。

    youdao

  • Threat modeling is composed of three high-level steps: understanding the adversary's view, characterizing the security of the system, and determining threats.

    威胁模型三个高阶步骤所组成了解敌人观点描绘系统安全性特徵,以及判断威胁来源。

    youdao

  • Threat modeling is an iterative approach to assessing vulnerabilities in your application to find those that are the most dangerous because they expose the most sensitive data.

    威胁建模一种迭代方法用于评估应用程序中的漏洞找到公开敏感数据危险的漏洞。

    youdao

  • It is therefore important to understand all aspects of security, from the process of threat modeling during the design phase of your application, to its eventual deployment and ongoing maintenance.

    因此了解安全性各个方面(应用程序设计阶段期间威胁建模过程应用程序的最终部署不断的维护)非常重要

    youdao

  • The report calls Moss “a fashion world double threatbecause of her lucrative modeling and designing gigs.

    因为莫斯模特设计事业上都收入颇丰,福布斯称其为“时尚界的双重威胁”。

    youdao

  • The content of battle damage simulation is briefly introduced in this paper, while the basic structure and modeling methods of threat model, equipment model and damage model are discussed in detail.

    该文简要介绍了装备战斗损伤仿真内容详细论述了威胁模型装备模型损伤模型基本结构建模方法

    youdao

  • However, insider attack modeling and threat analysis tools have not been evolved at the same rate.

    然而攻击建模威胁分析工具方面的研究仍处于摸索阶段。

    youdao

  • However, insider attack modeling and threat analysis tools have not been evolved at the same rate.

    然而攻击建模威胁分析工具方面的研究仍处于摸索阶段。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定