• Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.

    漏洞攻击扫描有助于识别操作系统LotusDomino配置潜在安全漏洞

    youdao

  • From the current point of view, their vulnerability to operating system of many enterprises has been neglected, leading to hackers, malware swoop, caused serious harm to enterprise security.

    目前来看很多企业一直忽略操作系统自身漏洞导致黑客恶意程序趁虚而入企业安全造成了严重危害

    youdao

  • Vulnerability repair of electric power production and control area secondary system is a necessary and important part of security protection work.

    电力生产控制区二次系统漏洞修补属于安全防护工作必不可少重要组成部分

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • This method partition the vulnerability more in detail, and make the system security administrators can patch the more serious vulnerabilities in the shortest times.

    方法使漏洞严重性划分更加细致,从而使系统安全管理员可以最短时间内修补严重的安全漏洞

    youdao

  • In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.

    提出一种可扩展网络弱点扫描系统能够在较短的时间内发现安全问题迅速做出反应极大地提高系统的安全防御能力

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • This method divides the vulnerability in detail, and helps system security administrators patch the vulnerabilities in the shortest time.

    方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以最短的时间内修补更严重安全漏洞

    youdao

  • It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.

    通过构造一个有明显安全漏洞系统来引诱入侵者进行攻击捕获入侵者攻击过程中在蜜罐系统活动数据

    youdao

  • This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).

    本文概述了目前安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。

    youdao

  • System has taken some security measures to maintain system security, of preventing SQL injection vulnerability functions.

    系统采取了一些安全措施维护系统安全,实现防止SQL注入漏洞等功能。

    youdao

  • "Exploitation of this vulnerability allows attackers to break out of an isolated guest system to compromise the underlying host system that controls it," claimed Core Security.

    利用这个弱点使攻击者突破一个孤立客户系统,以妥协背后主机系统控制”,声称为核心安全

    youdao

  • In order to safeguard the security of network information system, the network vulnerability detecting system is worth of thorough research.

    为了保障网络信息系统安全,必须网络漏洞探测系统进行深入研究

    youdao

  • In order to safeguard the security of network information system, the network vulnerability detecting system is worth of thorough research.

    为了保障网络信息系统安全,必须网络漏洞探测系统进行深入研究

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定