technical vulnerability

technical vulnerability
степень аппаратной защищенности

English-Russian dictionary of telecommunications and their abbreviations. . 2004.

Игры ⚽ Нужно сделать НИР?

Смотреть что такое "technical vulnerability" в других словарях:

  • Vulnerability and Risk Committee — The Vulnerability and Risk Committee, or VRC, is one of the four technical committees within the Council on Disaster Reduction of the American Society of Civil Engineers. Purpose The purpose of the Vulnerability and Risk Committee is to develop… …   Wikipedia

  • Information Assurance Vulnerability Alert — An Information Assurance Vulnerability Alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD CERT, a division …   Wikipedia

  • Windows Metafile vulnerability — The Windows Metafile vulnerability is a security vulnerability in Microsoft Windows NT based operating systems which has been used in a variety of exploits since late December 2005. The vulnerability was first discussed in the computer security… …   Wikipedia

  • Defense Technical Information Center — Department overview Headquarters Fort Belvoir, Virginia …   Wikipedia

  • Security Technical Implementation Guide — A Security Technical Implementation Guide or STIG is a methodology for standardized secure installation and maintenance of computer software and hardware. The term was coined by DISA who creates configuration documents in support of the United… …   Wikipedia

  • Joint Technical Coordinating Group for Munitions Effectiveness — A Joint Staff level organization tasked to produce generic target vulnerability and weaponeering studies. The special operations working group is a subordinate organization specializing in studies for special operations. Also called JTCG ME …   Military dictionary

  • CSTVRP — Computer Security Technical Vulnerability Reporting Program (Governmental » Military) …   Abbreviations dictionary

  • Effects of global warming — This article is about (primarily) effects during the 21st century. For longer term effects, see Long term effects of global warming. The variou …   Wikipedia

  • Conficker — Common name Aliases Mal/Conficker A(Sophos) Win32/Conficker.A (CA) W32.Downadup (Symantec) W32/Downadup.A (F Secure) Conficker.A (Panda) Net Worm.Win32.Kido.bt ( …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • SQL injection — A SQL injection is often used to attack the security of a website by inputting SQL statements in a web form to get a badly designed website in order to dump the database content to the attacker. SQL injection is a code injection technique that… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»