• Consider establishing a newsfeed for new threats and vulnerabilities.

    可以考虑通过新闻feed了解新的威胁漏洞。

    youdao

  • They are ask users to “treat it with a sceptical eye, and report bugs and vulnerabilities.”

    他们要求用户怀疑眼光来使用,随时报告使用中的故障弱点。

    youdao

  • Threats and vulnerabilities are classified under confidentiality, integrity, and availability.

    威胁弱点机密性、完整性可用性中是分级的。

    youdao

  • Of course, UAS use in urban environments does not come without some risks and vulnerabilities.

    当然UAS城市巷战中并非毫无风险弱点

    youdao

  • This will enable the supervisors to better monitor risks and vulnerabilities in the corporate sector.

    使监管人员可以更好地监测公司部门风险弱点

    youdao

  • Counsel can address risks and vulnerabilities that arise from changes in the technical, business and legal environments.

    法律顾问可以探讨由于技术业务法律环境变化产生的风险弱点

    youdao

  • Risk assessment is the process of identifying assets, threats, and vulnerabilities, measuring risks and the prioritizing risks.

    风险评估标识资产威胁漏洞度量风险风险进行优先排序过程

    youdao

  • Sites such as Security Focus (see Resources) collect information on a number of exploits and vulnerabilities and are worth watching.

    SecurityFocus(参见参考资料)之类的站点收集大量有关攻击安全漏洞信息,值得一看。

    youdao

  • This process introduces latent defects and vulnerabilities into our implementations, which accumulate in the form of growing potential risk.

    过程我们实现中引入了潜在缺陷漏洞不断增加潜在风险形式积累

    youdao

  • Taking a deeper look at threats and vulnerabilities, he cautions on the possibility of information being compromised without proper safeguards in place.

    通过威胁脆弱点深入观察,提醒人们缺乏适当保护可能会造成信息破坏

    youdao

  • Assessment of threats to, impacts on and vulnerabilities of information and information processing facilities and the likelihood of their occurrence.

    信息信息处理设施危害影响薄弱点三者发生可能性评估

    youdao

  • It is important to recognize that a small but significant number of thinkers were willing to think outside the box and were aware of many risks and vulnerabilities.

    重要承认一小部分思考者愿意打破常规思考问题,觉察许多风险和漏洞。

    youdao

  • Identify potential threats and vulnerabilities for business processes, associated data and supporting capabilities to assist in the evaluation of enterprise risk.

    识别出潜在威胁危险业务过程相关数据支撑能力帮助评估企业风险

    youdao

  • As shown in Figure 1, you need the Risk analysis orchestrator to update ever-growing complexity of repositories of assets, threats, and vulnerabilities across the SOAs.

    如图1中所示,需要风险分析协调器更新由SOA上资产威胁漏洞组成的存储库不断增长的复杂性

    youdao

  • Of course, Linux also gets attacked less frequently by viruses and malware, and vulnerabilities tend be found and fixed more quickly by its legions of developers and users.

    当然Linux较少受到病毒恶意软件攻击而且其系统漏洞往往都即时发现开发者和用户所组成的快速军团也能迅速地修复这些漏洞。

    youdao

  • No matter how well you change code in the Ajax format to make it more bandwidth efficient, there will be always risks and vulnerabilities you'll need to watch out for and mitigate.

    无论怎样修改Ajax代码提高带宽效率始终存在一些风险漏洞需要进行监视并解决。

    youdao

  • In other words, it was not a random drawing from a distribution of events with a fat tail but actually predictable in advance given the rising macro and financial risks and vulnerabilities.

    话说,并非带有一系列离散事件随机结果,而是事先观察到上升的宏观及金融风险后完全可以预见到的。

    youdao

  • No matter how well you can change the codes in an Ajax application to make it more bandwidth efficient, there will be always risks and vulnerabilities you'll need to watch out for and mitigate.

    无论怎样修改Ajax代码提高带宽效率始终存在一些风险漏洞需要进行监视并解决。

    youdao

  • It can enumerate product names and vulnerabilities, including software flaws and configuration problems, identify the presence of vulnerabilities and assign severity scores to software flaws.

    可以列举产品名称脆弱性包括软件漏洞配置问题找出存在漏洞分配软件缺陷严重分值

    youdao

  • The probability that a damaging impact will occur is not easy to determine as it requires the coincidence of one or more threats and vulnerabilities, which are themselves generally unpredictable.

    发生破坏影响可能性之所以容易确定,是因为需要一个更多威胁弱点的同时发生,通常它们自己不可预测的。

    youdao

  • The SSRM helps to address the security requirements of the SOA due to increased exposure to risks and vulnerabilities of loose coupling of the services and operations across organizational boundaries.

    SSRM帮助处理SOA安全需求由于服务操作组织边界松散耦合增加了风险漏洞暴露,从而导致了这些安全需求。

    youdao

  • Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.

    今年严重客户雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统业务流程寻找可能存在的安全隐患。

    youdao

  • In contrast, Lamb said the boys could look up to the old-style heroes such as Superman, "because outside of their costumes they were real people with real problems and many vulnerabilities".

    相比之下,兰姆教授男孩可以参考老式英雄比如超人,“因为他们装束之外他们实在实在的问题许多的弱点。”

    youdao

  • New vulnerabilities and new threats emerge.

    出现了漏洞威胁

    youdao

  • By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.

    蠕虫定义如下,蠕虫一个自包含软件组件可以自动执行可识别攻击目标系统漏洞探测操作

    youdao

  • But the document can also be used by software designers, architects and even CIOs, which should be aware of these possible vulnerabilities and take appropriate measures.

    同时文档适用软件设计师架构师甚至cio他们应该了解这些可能出现弱点采取恰当的措施。

    youdao

  • Some of the negative consequences include: user frustration, slowdowns in performance, and security vulnerabilities.

    其中一些负面影响包括用户挫折感性能下降安全漏洞等

    youdao

  • The Email recipient in turn gets alerts from the orchestrators whenever they sense changes in assets, threats, vulnerabilities, and countermeasures.

    反过来只要协调器发现资产威胁漏洞对策变更,就会立即向电子邮件收件人发出警报

    youdao

  • The Email recipient in turn gets alerts from the orchestrators whenever they sense changes in assets, threats, vulnerabilities, and countermeasures.

    反过来只要协调器发现资产威胁漏洞对策变更,就会立即向电子邮件收件人发出警报

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定