Data recovery vulnerability. The cloud characteristics of pooling and elasticity entail that resources allocated to one user will be reallocated to a different user at a later time.
数据恢复漏洞:关于资源池和弹性的云特性意味着分配给一个用户的资源将有可能在稍后的时间被重新分配到不同的用户。
Sometimes, even just reading data can be a security vulnerability — before the data is even checked!
有时,即使只是读入数据也可以是安全漏洞——甚至在数据被检查之前!
To make sure the vulnerability information you would request is the correct data, you need to assess vulnerabilities in three simple steps.
为了证实您将请求的漏洞信息是正确的数据,您需要按照三个简单的步骤评估漏洞。
To get rid of this vulnerability, you can either perform input validation or ensure that user-submitted data is always HTML-escaped before displaying it.
要消除这种漏洞,可以执行输入验证,或者确保用户所提交的数据总是在显示之前已被html转义。
Experts disagree about the vulnerability of systems that run industrial plants, known as supervisory control and data acquisition (SCADA).
专家在被称为监测控制和数据采集(SCADA)的管理工业工厂的系统的脆弱性上意见不一。
Data leakage by virtual machine replication is a vulnerability that's also rooted in the use of cloning for providing on-demand service.
虚拟机复制造成的数据泄漏也是一个类似的漏洞,原因同样在于为了提供随需服务而进行镜像克隆。
printf format strings can also write data (using the %n directive) and reveal arbitrary data, making this a critical vulnerability. Following is an example of this mistake
printf 的格式化字符串也可以输出数据(使用 %n指令),并且可以暴露任意的数据,这就使得这个问题成为一个非常严重的漏洞。
Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.
测试额外的安全性和可攻击性问题;例如,所部署应用程序上会间接伤害数据中心中其他应用程序的恶意攻击。
The second vulnerability has to do with using user-controllable data to control a business process.
第二个安全漏洞与攻击者借助用户可管理数据来控制业务流程有关。
At the heart of the XSS vulnerability is an application that filters user data improperly once submitted.
XSS攻击的核心是一个应用程序,该应用程序可以在用户数据提交之后进行过滤。
It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.
它通过构造一个有明显安全漏洞的系统来引诱入侵者对其进行攻击,捕获入侵者攻击过程中在蜜罐系统上的活动数据。
Security professionals are drowning in log files, vulnerability scan reports, alerts, reports, and more, but the data is not actionable.
目前,安全专业人士正被淹没在日志文件、漏洞扫描、各种提醒、各类报 告等数据的海洋中,但这些数据并非不可操控的。
Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.
网络扫描是DNMAI中数据采集方法的一种,扫描结果也是脆弱性分析的基础数据之一。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
应用推荐