Every system has vulnerabilities that a knowledgeable thief could theoretically exploit.
每个系统都有漏洞,理论上,具备相关知识的小偷就可以对其加以利用。
Every one of them has vulnerabilities that a knowledgeable thief could theoretically exploit.
每个系统都有漏洞,如果小偷具备相关知识,理论上就可以对其加以利用。
It isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.
并不意外的是,关于受大众喜爱的家庭安全系统具有潜在缺陷,你会发现有许多很有说服力的观点。
So it isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.
因此,你会发现很多关于盛行的家庭安全系统潜在漏洞的强烈意见,这并不奇怪。
Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.
今年几起严重的客户和雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统和业务流程,以寻找可能存在的安全隐患。
New vulnerabilities and new threats emerge.
出现了新漏洞和新威胁。
Such vulnerabilities are called logical vulnerabilities.
一些漏洞被称为逻辑性漏洞。
Guard against Cross-Site Scripting (XSS) vulnerabilities.
保护跨站点脚本(Cross - site scripting,XSS)漏洞。
Poverty and the vulnerabilities associated with it remain entrenched.
贫困及与其如影随形的其他缺陷依旧根深蒂固。
After you assess vulnerabilities, prioritize them according to business risk.
在评估漏洞之后,根据业务风险为其划分优先级。
It cannot defend against vulnerabilities in third-party scripts or servers.
它不能抵御第三方脚本或服务器中的安全漏洞。
To mitigate these vulnerabilities, you need to conduct a vulnerability assessment.
要缓解这种漏洞,您需要执行漏洞评估。
It equally shows up the projects which are slow to respond to vulnerabilities.
它同时显示了那些对于攻击反应迟钝的项目。
This TAI addresses the security vulnerabilities in the previous TAI and is preferred.
这种TAI解决了前一种TAI的安全漏洞,应该优先选用它。
Some vulnerabilities are not overly complex, and are thus easy for hackers to exploit.
一些脆弱点不太复杂,因而很容易被黑客利用。
Your goal is to mitigate the risks of exploiting vulnerabilities to an acceptable level.
您的目标是将漏洞被利用的风险减轻到可接受的程度。
Most users' knowledge of security vulnerabilities of their systems is vague at best.
大多数使用者对于安全攻击的知识都很匮乏。
When these vulnerabilities are exploited, the system or applications will perform poorly.
如果这些漏洞被人利用,应用程序或系统的性能将受到损害。
A risk is the likelihood of a threat agent taking advantage of one or more vulnerabilities.
风险是构成威胁的个体利用一个或多个漏洞的可能性。
Following are some common examples to illustrate the vulnerabilities we've been discussing.
下面是几个常见的例子,可以说明我们刚才一直讨论的漏洞。
This leaves the many more mundane but less rectifiable vulnerabilities in American society.
这给美国社会留下了很多更平淡无奇或更难以矫正的脆弱性。
They also addressed vulnerabilities in chrome access by remote hosts and file uploading.
他们还解决了通过远程主机和文件上传进行访问时而产生攻击的弱点。
Threats and vulnerabilities are classified under confidentiality, integrity, and availability.
威胁和弱点在机密性、完整性和可用性中是分级的。
An effective overall security strategy is to be prepared when vulnerabilities are detected.
有效且全面的安全策略是在攻击被探测到时能够有所准备。
In this article, I discuss principles for managing XML deployment to avoid such vulnerabilities.
在本文中,我们讨论了为了避免出现这种缺陷而对管理XML部署所采用的一些准则。
This analysis doesn't uncover internal application vulnerabilities, but does expose most others.
这一分析不会揭示内部应用程序漏洞,但会揭示其他大多数漏洞。
Such tools, called vulnerability checking tools, detect the potential vulnerabilities in advance.
此类工具称为漏洞检查工具,它们能预先检测出潜在的漏洞。
You should make informed decisions about where he will host and what his vulnerabilities will be.
您应当作出明智的决策,确定服务提供商的托管位置以及存在的安全漏洞。
You should make informed decisions about where he will host and what his vulnerabilities will be.
您应当作出明智的决策,确定服务提供商的托管位置以及存在的安全漏洞。
应用推荐