• 缓解这种漏洞需要执行漏洞评估

    To mitigate these vulnerabilities, you need to conduct a vulnerability assessment.

    youdao

  • 解决方案提供漏洞评估配置审计功能让 DBA 可以直接评估数据库安全性

    The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.

    youdao

  • 首先介绍方法基本原理然后介绍方法在安全漏洞评估中的具体实现。

    First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.

    youdao

  • 本文概述了目前安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。

    This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).

    youdao

  • 论文漏洞评估原理攻击路径漏洞本身,提出种基于攻击路径的漏洞风险评估模型。

    The paper begins with an analysis in vulnerability risk evaluation, including its theory, attack graph and specialty of vulnerability.

    youdao

  • 阿西莫夫小说中的机器人暴露出三条法则复杂性漏洞即使这些法则奏效,机器人还是不得不情况进行评估

    The robots in Asimov's fiction expose complications and loopholes in the three laws, and even when the laws work, robots still have to assess situations.

    youdao

  • 识别所有评估资产之后一个步骤就是识别评估每种资产可能黑客攻击者利用漏洞

    After you get all the assets for assessment identified, the next step is to identify and assess the vulnerabilities of each asset that a hacker or attacker could maliciously exploit.

    youdao

  • 风险评估标识资产威胁漏洞度量风险风险进行优先排序过程

    Risk assessment is the process of identifying assets, threats, and vulnerabilities, measuring risks and the prioritizing risks.

    youdao

  • 为了证实请求漏洞信息正确数据,您需要按照三个简单步骤评估漏洞

    To make sure the vulnerability information you would request is the correct data, you need to assess vulnerabilities in three simple steps.

    youdao

  • 如果关心应用程序隔离小心地每个使用场景进行评估查找潜在漏洞,并据此采取相应措施。

    If you are concerned about application isolation, you should carefully evaluate every usage scenario and look for potential weaknesses and act accordingly.

    youdao

  • 整理资产之后可按照常规来识别评估漏洞

    After putting the assets together, you then identify and assess vulnerabilities on a regular schedule.

    youdao

  • 而且,萨默尔关于针对银行借贷底线裁决的承诺漏洞百出,其评估一个银行是否借贷充分具有相当随意性

    And Mr Summers's promise to judge Banks against lending baselines was porous enough to allow considerable discretion in assessing whether a bank is lending enough.

    youdao

  • 对于正在评估web漏洞扫描器应该读读这篇访谈文章。

    A must read interview for anyone who is interested in evaluating web vulnerability scanners.

    youdao

  • 评估漏洞之后根据业务风险为其划分优先级。

    After you assess vulnerabilities, prioritize them according to business risk.

    youdao

  • 网络安全评价复杂系统工程现有安全评估工具大都只是用于对网络系统安全漏洞进行扫描检测

    Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.

    youdao

  • 网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    youdao

  • 传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    youdao

  • 首先系统漏洞潜在攻击攻击目的可能导致的后果等进行安全风险分析评估

    First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.

    youdao

  • 如果任何资产漏洞另一次预计评估时间之前发生变化则重复两个步骤

    If the vulnerabilities of each asset change before the due time for another assessment , repeat the first two steps.

    youdao

  • 当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    youdao

  • 分析评估方法不足之处后,提出一种多维度安全漏洞风险评估方法。

    After analyzing various shortcomings of evaluation methods, the paper proposes a multi-dimensional security vulnerability evaluation model.

    youdao

  • 提早开发周期评估威胁,可增加在侦测安全性漏洞减少可能损害机会

    Evaluating threats early in the development cycle gives you the opportunity to mitigate potential damage wherever a vulnerability is detected.

    youdao

  • 威胁建模一种迭代方法用于评估应用程序中的漏洞找到公开敏感数据危险漏洞

    Threat modeling is an iterative approach to assessing vulnerabilities in your application to find those that are the most dangerous because they expose the most sensitive data.

    youdao

  • 另外,针对脆弱性评估本文提出了另外一种灵活方案,对软件漏洞评估调整可基于严重度高低作出相应提高或降低。

    In addition, in the vulnerability assessment, this paper presented one another flexible program in which the adjustment of the software vulnerability assessment was based on its severity.

    youdao

  • 利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    youdao

  • 利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定