要缓解这种漏洞,您需要执行漏洞评估。
To mitigate these vulnerabilities, you need to conduct a vulnerability assessment.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
首先介绍了此方法的基本原理,然后介绍了该方法在安全漏洞评估中的具体实现。
First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.
本文概述了目前的安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。
This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).
论文从漏洞评估的原理、攻击路径及漏洞本身,提出一种基于攻击路径的漏洞风险评估模型。
The paper begins with an analysis in vulnerability risk evaluation, including its theory, attack graph and specialty of vulnerability.
阿西莫夫小说中的机器人暴露出这三条法则的复杂性与漏洞,即使这些法则奏效,机器人还是不得不对情况进行评估。
The robots in Asimov's fiction expose complications and loopholes in the three laws, and even when the laws work, robots still have to assess situations.
识别了所有要评估的资产之后,下一个步骤就是识别并评估每种资产可能被黑客或攻击者利用的漏洞。
After you get all the assets for assessment identified, the next step is to identify and assess the vulnerabilities of each asset that a hacker or attacker could maliciously exploit.
风险评估是标识资产、威胁和漏洞并度量风险和对风险进行优先排序的过程。
Risk assessment is the process of identifying assets, threats, and vulnerabilities, measuring risks and the prioritizing risks.
为了证实您将请求的漏洞信息是正确的数据,您需要按照三个简单的步骤评估漏洞。
To make sure the vulnerability information you would request is the correct data, you need to assess vulnerabilities in three simple steps.
如果您关心应用程序隔离,则应小心地对每个使用场景进行评估,并查找潜在的漏洞,并据此采取相应措施。
If you are concerned about application isolation, you should carefully evaluate every usage scenario and look for potential weaknesses and act accordingly.
整理资产之后,您可按照常规来识别和评估漏洞。
After putting the assets together, you then identify and assess vulnerabilities on a regular schedule.
而且,萨默尔关于针对银行借贷底线裁决的承诺漏洞百出,其评估一个银行是否借贷充分具有相当的随意性。
And Mr Summers's promise to judge Banks against lending baselines was porous enough to allow considerable discretion in assessing whether a bank is lending enough.
对于正在评估web漏洞扫描器的人应该读读这篇访谈文章。
A must read interview for anyone who is interested in evaluating web vulnerability scanners.
在评估漏洞之后,根据业务风险为其划分优先级。
After you assess vulnerabilities, prioritize them according to business risk.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
首先,要对系统漏洞、潜在的攻击者及攻击目的、可能导致的后果等进行安全风险分析评估。
First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.
如果任何资产的漏洞在另一次预计评估时间之前发生变化,则重复前两个步骤。
If the vulnerabilities of each asset change before the due time for another assessment , repeat the first two steps.
当前,最常用的网络安全评价方法是风险评估方法,以及利用漏洞扫描工具软件来测试和评估系统的安全程度等。
At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.
在分析其评估方法的不足之处后,提出了一种多维度的安全漏洞风险评估方法。
After analyzing various shortcomings of evaluation methods, the paper proposes a multi-dimensional security vulnerability evaluation model.
提早在开发周期中评估威胁,可增加在侦测到安全性漏洞时减少可能损害的机会。
Evaluating threats early in the development cycle gives you the opportunity to mitigate potential damage wherever a vulnerability is detected.
威胁建模是一种迭代方法,用于评估应用程序中的漏洞,以找到可公开敏感数据的最危险的漏洞。
Threat modeling is an iterative approach to assessing vulnerabilities in your application to find those that are the most dangerous because they expose the most sensitive data.
另外,针对脆弱性评估,本文提出了另外一种灵活的方案,对软件漏洞的评估调整可基于其严重度高低作出相应提高或降低。
In addition, in the vulnerability assessment, this paper presented one another flexible program in which the adjustment of the software vulnerability assessment was based on its severity.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
应用推荐