• Deployment of industrial vulnerability scanning system, industrial system vulnerabilities found in a timely manner.

    部署工控漏洞扫描系统及时发现工控系统漏洞

    youdao

  • How to discover, fix and exploit computer system vulnerabilities has been one of the focuses of the study on network security.

    如何发现修补利用计算机漏洞网络攻防研究焦点问题之一

    youdao

  • New security capabilities add deeper levels of management, user governance, and auditing to decrease system vulnerabilities, while maximizing developer productivity.

    新的安全特性增加了更深层次管理用户治理审计,从而减少系统漏洞并大大提高开发人员效率

    youdao

  • As the foundation of the study on network security, how to discover and handle computer system vulnerabilities have always been one of the focuses of the field.

    作为网络安全研究基础计算机系统脆弱性发现应对等相关工作始终是网络安全研究的焦点之一

    youdao

  • Smart city system in the construction process may be the following system security risks: side channel attacks, system vulnerabilities, hardware failures, program defects.

    智慧城市中的系统建设过程中可能存在以下的系统安全隐患信道攻击、系统漏洞硬件故障程序缺陷。

    youdao

  • First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.

    首先系统漏洞潜在攻击攻击目的可能导致的后果等进行安全风险分析评估

    youdao

  • Its primary aim is to improve internal controls for financial reporting by establishing mandatory requirements for assessing risks to information system vulnerabilities that can be easily exploited.

    主要目标通过可能利用的信息系统弱点进行评估而建立一些强制需求,以此提高财务报表内部控制

    youdao

  • Every system has vulnerabilities that a knowledgeable thief could theoretically exploit.

    每个系统都有漏洞理论上具备相关知识的小偷就可以对其加以利用。

    youdao

  • Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.

    黑客可以根据所收集信息推断出可能弱点选择选定目标系统最佳攻击方法

    youdao

  • Vulnerabilities exist at entry and exit points in the system.

    弱点存在于系统入口出口

    youdao

  • By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.

    蠕虫定义如下,蠕虫一个自包含软件组件可以自动执行可识别攻击目标系统漏洞探测操作

    youdao

  • Scan each system discovered to uncover vulnerabilities, and move toward exploiting the vulnerability.

    扫描发现每个系统发现漏洞利用漏洞

    youdao

  • When these vulnerabilities are exploited, the system or applications will perform poorly.

    如果这些漏洞人利用,应用程序系统性能将受到损害。

    youdao

  • For all instances, you need to determine how high or low the risks are that a threat agent could take advantage of system and server vulnerabilities and the resulting business impact.

    对于上面的四个例子,需要判断威胁利用系统服务器漏洞风险级别以及业务造成的影响。

    youdao

  • Just make sure you and your system can provide countermeasures for any chat vulnerabilities hackers could exploit.

    只需确保系统能够提供聊天漏洞应对之策防止黑客利用这些漏洞进行攻击。

    youdao

  • Bugs that take advantage of vulnerabilities in the base operating system of the computer running the Web browser will also be ineligible.

    另外操作系统漏洞导致浏览器问题不在该计划范围之内

    youdao

  • Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.

    Cisco已经警告,在InternetOperatingSystem软件具有三个可能引发拒绝服务,运行任意代码系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."

    youdao

  • You'll need a team of developers, testers, system administrators, and potential users to speed up Ajax applications while dodging Web services vulnerabilities.

    提高Ajax应用程序的性能,同时避开Web服务漏洞团队需要开发人员测试人员系统管理员潜在用户组成。

    youdao

  • But the greater transparency also could highlight previously unknown vulnerabilities in parts of the banking system.

    但是公开细节越多越透明,银行业部分以前未知弱点得到放大

    youdao

  • You can use this option to minimize the risk of security vulnerabilities in the AIX operating system.

    可以使用这个选项尽可能降低AIX操作系统中的安全风险

    youdao

  • Buffer overrun vulnerabilities are so difficult to prevent that scores of them are being found and exploited in operating system and application software every day.

    缓冲区溢出漏洞那么难相处防止数十种,他们都是找到利用操作系统应用软件一天。

    youdao

  • Check for vulnerabilities of your computer systems: Warning! The test found visible port (s) on your system: 21, 23, 80, 1080, 3128.

    检查计算机系统是否漏洞警告测试发现您的系统存在可见端口2123、80、1080、3128。

    youdao

  • So, dig deeply vulnerabilities and improve precision of scan becomes the soul of scanning the system.

    因此挖掘深化漏洞提高扫描精度成为扫描系统灵魂

    youdao

  • Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.

    网络安全评价复杂系统工程现有安全评估工具大都只是用于对网络系统安全漏洞进行扫描检测

    youdao

  • This method partition the vulnerability more in detail, and make the system security administrators can patch the more serious vulnerabilities in the shortest times.

    方法使漏洞严重性划分更加细致,从而使系统安全管理员可以最短时间内修补严重的安全漏洞

    youdao

  • It is need to research vulnerability taxonomy technology for the purpose of analyzing vulnerabilities completely, because the taxonomy is the foundation of system research.

    全面分析脆弱性必须研究脆弱性分类技术因为分类系统研究基础

    youdao

  • Testing the correctness of the system configuration and security holes, and prompts the administrator to fix vulnerabilities.

    检测系统配置正确性安全漏洞提示管理员修补漏洞

    youdao

  • This method divides the vulnerability in detail, and helps system security administrators patch the vulnerabilities in the shortest time.

    方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以最短的时间内修补更严重安全漏洞

    youdao

  • In case it this information is intercepted by an attacker, it can be used to reveal vulnerabilities in the computer's security system.

    这种情况下攻击截获信息可以用来显示计算机安全系统漏洞

    youdao

  • In case it this information is intercepted by an attacker, it can be used to reveal vulnerabilities in the computer's security system.

    这种情况下攻击截获信息可以用来显示计算机安全系统漏洞

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定