Deployment of industrial vulnerability scanning system, industrial system vulnerabilities found in a timely manner.
部署工控漏洞扫描系统,及时发现工控系统漏洞。
How to discover, fix and exploit computer system vulnerabilities has been one of the focuses of the study on network security.
如何发现、修补和利用计算机漏洞,是网络攻防研究的焦点问题之一。
New security capabilities add deeper levels of management, user governance, and auditing to decrease system vulnerabilities, while maximizing developer productivity.
新的安全特性增加了更深层次的管理、用户治理和审计,从而减少系统漏洞并大大提高开发人员的效率。
As the foundation of the study on network security, how to discover and handle computer system vulnerabilities have always been one of the focuses of the field.
作为网络安全研究的基础,计算机系统脆弱性的发现和应对等相关工作始终是网络安全研究的焦点之一。
Smart city system in the construction process may be the following system security risks: side channel attacks, system vulnerabilities, hardware failures, program defects.
智慧城市中的系统在建设过程中可能存在以下的系统安全隐患:边信道攻击、系统漏洞、硬件故障、程序缺陷。
First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.
首先,要对系统漏洞、潜在的攻击者及攻击目的、可能导致的后果等进行安全风险分析评估。
Its primary aim is to improve internal controls for financial reporting by establishing mandatory requirements for assessing risks to information system vulnerabilities that can be easily exploited.
其主要目标是,通过对可能被利用的信息系统弱点进行评估而建立一些强制需求,以此提高对财务报表的内部控制。
Every system has vulnerabilities that a knowledgeable thief could theoretically exploit.
每个系统都有漏洞,理论上,具备相关知识的小偷就可以对其加以利用。
Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.
黑客可以根据所收集的信息推断出可能的弱点,并选择对选定目标系统的最佳攻击方法。
Vulnerabilities exist at entry and exit points in the system.
弱点存在于系统的入口和出口。
By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.
蠕虫的定义如下,蠕虫是一个自包含软件组件,可以自动执行可识别和攻击目标系统漏洞的探测操作。
Scan each system discovered to uncover vulnerabilities, and move toward exploiting the vulnerability.
扫描发现的每个系统,发现漏洞并利用该漏洞。
When these vulnerabilities are exploited, the system or applications will perform poorly.
如果这些漏洞被人利用,应用程序或系统的性能将受到损害。
For all instances, you need to determine how high or low the risks are that a threat agent could take advantage of system and server vulnerabilities and the resulting business impact.
对于上面的四个例子,您需要判断威胁方利用系统和服务器漏洞的风险级别以及对业务造成的影响。
Just make sure you and your system can provide countermeasures for any chat vulnerabilities hackers could exploit.
只需确保系统能够提供聊天漏洞的应对之策以防止黑客利用这些漏洞进行攻击。
Bugs that take advantage of vulnerabilities in the base operating system of the computer running the Web browser will also be ineligible.
另外操作系统漏洞导致的浏览器问题也不在该计划范围之内。
Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.
Cisco已经被警告,在InternetOperatingSystem软件中具有三个可能引发拒绝服务,运行任意代码和系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."
You'll need a team of developers, testers, system administrators, and potential users to speed up Ajax applications while dodging Web services vulnerabilities.
要提高Ajax应用程序的性能,同时避开Web服务漏洞,您的团队需要由开发人员、测试人员、系统管理员和潜在用户组成。
But the greater transparency also could highlight previously unknown vulnerabilities in parts of the banking system.
但是公开的细节越多越透明,银行业部分以前未知的弱点也会得到放大。
You can use this option to minimize the risk of security vulnerabilities in the AIX operating system.
可以使用这个选项尽可能降低AIX操作系统中的安全风险。
Buffer overrun vulnerabilities are so difficult to prevent that scores of them are being found and exploited in operating system and application software every day.
缓冲区溢出漏洞是那么难相处,以防止数十种,他们都是被找到和利用操作系统和应用软件,每一天。
Check for vulnerabilities of your computer systems: Warning! The test found visible port (s) on your system: 21, 23, 80, 1080, 3128.
检查您的计算机系统是否有漏洞:警告!本测试发现您的系统存在可见端口:21、23、80、1080、3128。
So, dig deeply vulnerabilities and improve precision of scan becomes the soul of scanning the system.
因此,挖掘深化漏洞,提高扫描精度成为扫描系统的灵魂。
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
This method partition the vulnerability more in detail, and make the system security administrators can patch the more serious vulnerabilities in the shortest times.
该方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以在最短的时间内修补更严重的安全漏洞。
It is need to research vulnerability taxonomy technology for the purpose of analyzing vulnerabilities completely, because the taxonomy is the foundation of system research.
要全面分析脆弱性就必须研究脆弱性分类技术,因为分类是系统研究的基础。
Testing the correctness of the system configuration and security holes, and prompts the administrator to fix vulnerabilities.
检测系统配置的正确性和安全漏洞,并提示管理员修补漏洞。
This method divides the vulnerability in detail, and helps system security administrators patch the vulnerabilities in the shortest time.
该方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以在最短的时间内修补更严重的安全漏洞。
In case it this information is intercepted by an attacker, it can be used to reveal vulnerabilities in the computer's security system.
在这种情况下,被攻击者截获的信息,它可以用来显示在计算机的安全系统漏洞。
In case it this information is intercepted by an attacker, it can be used to reveal vulnerabilities in the computer's security system.
在这种情况下,被攻击者截获的信息,它可以用来显示在计算机的安全系统漏洞。
应用推荐