vulnerabilities - definizione. Che cos'è vulnerabilities
Diclib.com
Dizionario ChatGPT
Inserisci una parola o una frase in qualsiasi lingua 👆
Lingua:

Traduzione e analisi delle parole tramite l'intelligenza artificiale ChatGPT

In questa pagina puoi ottenere un'analisi dettagliata di una parola o frase, prodotta utilizzando la migliore tecnologia di intelligenza artificiale fino ad oggi:

  • come viene usata la parola
  • frequenza di utilizzo
  • è usato più spesso nel discorso orale o scritto
  • opzioni di traduzione delle parole
  • esempi di utilizzo (varie frasi con traduzione)
  • etimologia

Cosa (chi) è vulnerabilities - definizione

SECURITY WEAKNESS WHICH ALLOWS AN ATTACKER TO REDUCE A SYSTEM'S INFORMATION ASSURANCE
Software security vulnerability; Security vulnerability; Software Security vulnerability; Security hole; Vulnerability disclosure; Vulnerability (computer science); Software Vulnerabilities.; Software vulnerability; Software vulnerabilities; Security vulnerabilities; Security Holes; Vulnerability window; Network vulnerability scan; Vuln; Weakness (computing); Vulnerability research; Computer security vulnerability; Component Vulnerability; Draft:Component Vulnerability; Computer security vulnerabilities; Vulnerability (software)
  • OWASP: relationship between threat agent and business impact

Invulnerable         
THE INABILITY OF AN ENTITY TO WITHSTAND THE ADVERSE EFFECTS OF A HOSTILE OR UNCERTAIN ENVIRONMENT
Window of vulnerability; Vulnerabilities; Invulnerable; Invulnerability
·adj Incapable of being wounded, or of receiving injury.
II. Invulnerable ·adj Unanswerable; irrefutable; that can not be refuted or convinced; as, an invulnerable argument.
invulnerable         
THE INABILITY OF AN ENTITY TO WITHSTAND THE ADVERSE EFFECTS OF A HOSTILE OR UNCERTAIN ENVIRONMENT
Window of vulnerability; Vulnerabilities; Invulnerable; Invulnerability
If someone or something is invulnerable, they cannot be harmed or damaged.
Many daughters assume that their mothers are invulnerable.
? vulnerable
ADJ: oft ADJ to n
invulnerability
They have a sense of invulnerability to disease.
N-UNCOUNT
vulnerability         
THE INABILITY OF AN ENTITY TO WITHSTAND THE ADVERSE EFFECTS OF A HOSTILE OR UNCERTAIN ENVIRONMENT
Window of vulnerability; Vulnerabilities; Invulnerable; Invulnerability

Wikipedia

Vulnerability (computing)

Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware. Vulnerabilities can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerabilities are also known as the attack surface.

Vulnerability management is a cyclical practice that varies in theory but contains common processes which include: discover all assets, prioritize assets, assess or perform a complete vulnerability scan, report on results, remediate vulnerabilities, verify remediation - repeat. This practice generally refers to software vulnerabilities in computing systems. Agile vulnerability management refers preventing attacks by identifying all vulnerabilities as quickly as possible.

A security risk is often incorrectly classified as a vulnerability. The use of vulnerability with the same meaning of risk can lead to confusion. The risk is the potential of a significant impact resulting from the exploit of a vulnerability. Then there are vulnerabilities without risk: for example when the affected asset has no value. A vulnerability with one or more known instances of working and fully implemented attacks is classified as an exploitable vulnerability—a vulnerability for which an exploit exists. The window of vulnerability is the time from when the security hole was introduced or manifested in deployed software, to when access was removed, a security fix was available/deployed, or the attacker was disabled—see zero-day attack.

Security bug (security defect) is a narrower concept. There are vulnerabilities that are not related to software: hardware, site, personnel vulnerabilities are examples of vulnerabilities that are not software security bugs.

Constructs in programming languages that are difficult to use properly can manifest large numbers of vulnerabilities.

Esempi dal corpus di testo per vulnerabilities
1. McCain‘s vulnerabilities as a candidate are legion.
2. Afghanistans twin vulnerabilities remain÷ drugs and terrorism.
3. Afghanistan’s twin vulnerabilities remain÷ drugs and terrorism.
4. But already insurgents have exploited the operation‘s vulnerabilities.
5. Both candidates seem aware of their vulnerabilities on the issue.