network vulnerability - vertaling naar russisch
Diclib.com
Woordenboek ChatGPT
Voer een woord of zin in in een taal naar keuze 👆
Taal:

Vertaling en analyse van woorden door kunstmatige intelligentie ChatGPT

Op deze pagina kunt u een gedetailleerde analyse krijgen van een woord of zin, geproduceerd met behulp van de beste kunstmatige intelligentietechnologie tot nu toe:

  • hoe het woord wordt gebruikt
  • gebruiksfrequentie
  • het wordt vaker gebruikt in mondelinge of schriftelijke toespraken
  • opties voor woordvertaling
  • Gebruiksvoorbeelden (meerdere zinnen met vertaling)
  • etymologie

network vulnerability - vertaling naar russisch

SOFTWARE OR OTHER TOOL FOR PROBING COMPUTER SYSTEMS FOR KNOWN SECURITY PROBLEMS
Vulnerability Scanner; Network Reconnaissance

network vulnerability      
уязвимость сети
security vulnerability         
SECURITY WEAKNESS WHICH ALLOWS AN ATTACKER TO REDUCE A SYSTEM'S INFORMATION ASSURANCE
Software security vulnerability; Security vulnerability; Software Security vulnerability; Security hole; Vulnerability disclosure; Vulnerability (computer science); Software Vulnerabilities.; Software vulnerability; Software vulnerabilities; Security vulnerabilities; Security Holes; Vulnerability window; Network vulnerability scan; Vuln; Weakness (computing); Vulnerability research; Computer security vulnerability; Component Vulnerability; Draft:Component Vulnerability; Computer security vulnerabilities; Vulnerability (software)

общая лексика

уязвимости защиты, уязвимости системы безопасности

нарушение на определённом наборе входных данных или некоторой последовательности действий корректной работы программы, приводящее к преодолению защиты системы в целом

Смотрите также

security; vulnerability

security vulnerability         
SECURITY WEAKNESS WHICH ALLOWS AN ATTACKER TO REDUCE A SYSTEM'S INFORMATION ASSURANCE
Software security vulnerability; Security vulnerability; Software Security vulnerability; Security hole; Vulnerability disclosure; Vulnerability (computer science); Software Vulnerabilities.; Software vulnerability; Software vulnerabilities; Security vulnerabilities; Security Holes; Vulnerability window; Network vulnerability scan; Vuln; Weakness (computing); Vulnerability research; Computer security vulnerability; Component Vulnerability; Draft:Component Vulnerability; Computer security vulnerabilities; Vulnerability (software)
уязвимость (системы) безопасности

Definitie

СИ-ЭН-ЭН
(CNN) , см. "Кейбл ньюс нетуорк".

Wikipedia

Vulnerability scanner

A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. These scanners are used to discover the weaknesses of a given system. They are utilized in the identification and detection of vulnerabilities arising from mis-configurations or flawed programming within a network-based asset such as a firewall, router, web server, application server, etc. Modern vulnerability scanners allow for both authenticated and unauthenticated scans. Modern scanners are typically available as SaaS (Software as a Service); provided over the internet and delivered as a web application. The modern vulnerability scanner often has the ability to customize vulnerability reports as well as the installed software, open ports, certificates and other host information that can be queried as part of its workflow.

  • Authenticated scans allow for the scanner to directly access network based assets using remote administrative protocols such as secure shell (SSH) or remote desktop protocol (RDP) and authenticate using provided system credentials. This allows the vulnerability scanner to access low-level data, such as specific services and configuration details of the host operating system. It's then able to provide detailed and accurate information about the operating system and installed software, including configuration issues and missing security patches.
  • Unauthenticated scans is a method that can result in a high number of false positives and is unable to provide detailed information about the assets operating system and installed software. This method is typically used by threat actors or security analyst trying determine the security posture of externally accessible assets.

The CIS Critical Security Controls for Effective Cyber Defense designates continuous vulnerability scanning as a critical control for effective cyber defense.

Vertaling van &#39network vulnerability&#39 naar Russisch