vulnerability assessment - ترجمة إلى الروسية
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

vulnerability assessment - ترجمة إلى الروسية

PROCESS OF IDENTIFYING, QUANTIFYING, AND PRIORITIZING THE VULNERABILITIES IN A SYSTEM
User:Lodhimuhammad/new article name here; Vulnerability analysis

vulnerability assessment         
оценка уязвимости
vulnerability analysis         
анализ уязвимости (объекта или системы)
security vulnerability         
  • OWASP: relationship between threat agent and business impact
SECURITY WEAKNESS WHICH ALLOWS AN ATTACKER TO REDUCE A SYSTEM'S INFORMATION ASSURANCE
Software security vulnerability; Security vulnerability; Software Security vulnerability; Security hole; Vulnerability disclosure; Vulnerability (computer science); Software Vulnerabilities.; Software vulnerability; Software vulnerabilities; Security vulnerabilities; Security Holes; Vulnerability window; Network vulnerability scan; Vuln; Weakness (computing); Vulnerability research; Computer security vulnerability; Component Vulnerability; Draft:Component Vulnerability; Computer security vulnerabilities; Vulnerability (software)

общая лексика

уязвимости защиты, уязвимости системы безопасности

нарушение на определённом наборе входных данных или некоторой последовательности действий корректной работы программы, приводящее к преодолению защиты системы в целом

Смотрите также

security; vulnerability

تعريف

oval
(ovals)
Oval things have a shape that is like a circle but is wider in one direction than the other.
...the small oval framed picture of a little boy.
ADJ: usu ADJ n
Oval is also a noun.
Using 2 spoons, mould the cheese into small balls or ovals.
N-COUNT: usu sing

ويكيبيديا

Vulnerability assessment

A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures. Vulnerability from the perspective of disaster management means assessing the threats from potential hazards to the population and to infrastructure. It may be conducted in the political, social, economic or environmental fields.

Vulnerability assessment has many things in common with risk assessment. Assessments are typically performed according to the following steps:

  1. Cataloging assets and capabilities (resources) in a system.
  2. Assigning quantifiable value (or at least rank order) and importance to those resources
  3. Identifying the vulnerabilities or potential threats to each resource
  4. Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

"Classical risk analysis is principally concerned with investigating the risks surrounding a plant (or some other object), its design and operations. Such analysis tends to focus on causes and the direct consequences for the studied object. Vulnerability analysis, on the other hand, focuses both on consequences for the object itself and on primary and secondary consequences for the surrounding environment. It also concerns itself with the possibilities of reducing such consequences and of improving the capacity to manage future incidents." (Lövkvist-Andersen, et al., 2004) In general, a vulnerability analysis serves to "categorize key assets and drive the risk management process." (United States Department of Energy, 2002)1

In the United States, guides providing valuable considerations and templates for completing a vulnerability assessment are available from numerous agencies including the Department of Energy, the Environmental Protection Agency, and the United States Department of Transportation, just to name a few.

Several academic research papers including Turner et al. (2003), Ford and Smith (2004), Adger (2006), Fraser (2007) and Patt et al. (2010) amongst others, have provided a detail review of the diverse epistemologies and methodologies in vulnerability research. Turner et al. (2003) for example proposed a framework that illustrates the complexity and interactions involved in vulnerability analysis, draws attention to the array of factors and linkages that potentially affects the vulnerability of a couple of human–environment systems. The framework makes use of nested flowcharts to show how social and environmental forces interact to create situations vulnerable to sudden changes. Ford and Smith (2004), propose an analytical framework, based on research with Canadian arctic communities. They suggest that, the first stage is to assess current vulnerability by documenting exposures and current adaptive strategies. This should be followed by a second stage that estimates directional changes in those current risk factors and characterizes the community's future adaptive capacity. Ford and Smith's (2004) framework utilizes historic information including how communities have experienced and addressed climatic hazards, with information on what conditions are likely to change, and what constraints and opportunities there are for future adaptation.

أمثلة من مجموعة نصية لـ٪ 1
1. About 85 percent of Afghan households spend most of their income on food, the findings of a National Risk and Vulnerability Assessment (NRVA) say.
2. The G8 has completed a MANPADS vulnerability assessment (MVA) methodology to determine the optimum design for effective ground–based MANPADS counter–measures in the vicinity of an airport.
3. Aid workers say food prices have steadily increased since December 2007 when the vulnerability assessment was conducted – and more people have been pushed into high–risk food–insecurity.
4. A 2003 national vulnerability assessment revealed that some 3.5 million Afghans were extremely poor and chronically food insecure, while an additional 3 million were seasonally food insecure.
5. The Malawi Vulnerability Assessment Committee, grouping U.N. agencies and the Ministry of Agriculture, says Nsanje –– 120 km south of the commercial center Blantyre –– is the district with the highest food aid need in southern Malawi.
What is the الروسية for vulnerability assessment? Translation of &#39vulnerability assessment&#39 to