• Data recovery vulnerability. The cloud characteristics of pooling and elasticity entail that resources allocated to one user will be reallocated to a different user at a later time.

    数据恢复漏洞关于资源弹性特性意味着分配一个用户的资源可能在稍后的时间被重新分配不同的用户。

    youdao

  • Sometimes, even just reading data can be a security vulnerabilitybefore the data is even checked!

    有时即使只是读入数据可以安全漏洞——甚至在数据被检查之前

    youdao

  • To make sure the vulnerability information you would request is the correct data, you need to assess vulnerabilities in three simple steps.

    为了证实请求漏洞信息正确数据,您需要按照三个简单步骤评估漏洞

    youdao

  • To get rid of this vulnerability, you can either perform input validation or ensure that user-submitted data is always HTML-escaped before displaying it.

    消除这种漏洞可以执行输入验证或者确保用户所提交数据总是在显示之前已被html转义

    youdao

  • Experts disagree about the vulnerability of systems that run industrial plants, known as supervisory control and data acquisition (SCADA).

    专家称为监测控制数据采集(SCADA)管理工业工厂系统脆弱性意见不一。

    youdao

  • Data leakage by virtual machine replication is a vulnerability that's also rooted in the use of cloning for providing on-demand service.

    虚拟复制造成数据泄漏也是一个类似漏洞,原因同样在于为了提供随需服务而进行镜像克隆。

    youdao

  • printf format strings can also write data (using the %n directive) and reveal arbitrary data, making this a critical vulnerability. Following is an example of this mistake

    printf格式化字符串可以输出数据使用 %n指令),并且可以暴露任意的数据,这就使得这个问题成为一个非常严重漏洞

    youdao

  • Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    测试额外安全性可攻击性问题例如所部署应用程序上会间接伤害数据中心其他应用程序的恶意攻击

    youdao

  • The second vulnerability has to do with using user-controllable data to control a business process.

    第二个安全漏洞与攻击者借助用户可管理数据控制业务流程有关。

    youdao

  • At the heart of the XSS vulnerability is an application that filters user data improperly once submitted.

    XSS攻击核心一个应用程序,该应用程序可以用户数据提交之后进行过滤

    youdao

  • It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.

    通过构造一个有明显安全漏洞系统来引诱入侵者进行攻击捕获入侵者攻击过程中在蜜罐系统活动数据

    youdao

  • Security professionals are drowning in log files, vulnerability scan reports, alerts, reports, and more, but the data is not actionable.

    目前,安全专业人士淹没日志文件漏洞扫描、各种提醒、各类 告等数据的海洋中,这些数据并非不可操控的。

    youdao

  • Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.

    网络扫描DNMAI数据采集方法种,扫描结果也是脆弱性分析基础数据之一。

    youdao

  • This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    youdao

  • This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定