Every system has vulnerabilities that a knowledgeable thief could theoretically exploit.
每个系统都有漏洞,理论上,具备相关知识的小偷就可以对其加以利用。
Every one of them has vulnerabilities that a knowledgeable thief could theoretically exploit.
每个系统都有漏洞,如果小偷具备相关知识,理论上就可以对其加以利用。
It isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.
并不意外的是,关于受大众喜爱的家庭安全系统具有潜在缺陷,你会发现有许多很有说服力的观点。
So it isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.
因此,你会发现很多关于盛行的家庭安全系统潜在漏洞的强烈意见,这并不奇怪。
Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.
今年几起严重的客户和雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统和业务流程,以寻找可能存在的安全隐患。
We see our own vulnerabilities in them.
我们从他们身上看到了自己的弱点。
A.Determine privacy vulnerabilities.
确定隐私的薄弱环节。
New vulnerabilities and new threats emerge.
出现了新漏洞和新威胁。
This is also one of its vulnerabilities.
这也是在虚拟世界的安全漏洞中的一个。
Next, identify vulnerabilities your project could have.
接下来,需要标识项目可能具有的漏洞。
Such vulnerabilities are called logical vulnerabilities.
一些漏洞被称为逻辑性漏洞。
Guard against Cross-Site Scripting (XSS) vulnerabilities.
保护跨站点脚本(Cross - site scripting,XSS)漏洞。
Such vulnerabilities are also known as control challenges.
这种漏洞也被称为控制的挑战。
You can also use it to test for vulnerabilities on a site.
也可以使用它来测试站点上的漏洞。
Vulnerabilities exist at entry and exit points in the system.
弱点存在于系统的入口和出口。
An attacker can discover vulnerabilities much faster than you think!
攻击者找到漏洞的速度比你想想的快多了。
Poverty and the vulnerabilities associated with it remain entrenched.
贫困及与其如影随形的其他缺陷依旧根深蒂固。
But, there are some vulnerabilities that automated software cannot discover.
但是一些漏洞,自动化软件是发现不了的。
After you assess vulnerabilities, prioritize them according to business risk.
在评估漏洞之后,根据业务风险为其划分优先级。
It cannot defend against vulnerabilities in third-party scripts or servers.
它不能抵御第三方脚本或服务器中的安全漏洞。
WHO is working to address the specific vulnerabilities and health needs of women.
世卫组织正在努力处理妇女的特定脆弱性和卫生需求。
To mitigate these vulnerabilities, you need to conduct a vulnerability assessment.
要缓解这种漏洞,您需要执行漏洞评估。
It equally shows up the projects which are slow to respond to vulnerabilities.
它同时显示了那些对于攻击反应迟钝的项目。
This TAI addresses the security vulnerabilities in the previous TAI and is preferred.
这种TAI解决了前一种TAI的安全漏洞,应该优先选用它。
Some vulnerabilities are not overly complex, and are thus easy for hackers to exploit.
一些脆弱点不太复杂,因而很容易被黑客利用。
Your goal is to mitigate the risks of exploiting vulnerabilities to an acceptable level.
您的目标是将漏洞被利用的风险减轻到可接受的程度。
Most users' knowledge of security vulnerabilities of their systems is vague at best.
大多数使用者对于安全攻击的知识都很匮乏。
When these vulnerabilities are exploited, the system or applications will perform poorly.
如果这些漏洞被人利用,应用程序或系统的性能将受到损害。
When these vulnerabilities are exploited, the system or applications will perform poorly.
如果这些漏洞被人利用,应用程序或系统的性能将受到损害。
应用推荐