vulnerabilite

listen to the pronunciation of vulnerabilite
Turkish - English
(Tıp) vulnerability
a specific weakness in the protections or defences surrounding someone or something
A weakness in security procedures, network design, or implementation, that can be exploited to violate a corporate security policy
Any flaw in computer security that could allow an unauthorized user to gain control of a system
One or more attributes of a computer or a network that permit a subject to initiate patterns of misuse on that computer or network
(King, 1995) The proportion of fish in a fishing gear's area of influence that is retained by the gear
defines the extent to which climate change may damage or harm a system It depends not only a system’s sensitivity but also on its ability to adapt to new climatic conditions
The conditions for assigning premiums and undertrick penalties
Vulnerability is a flaw or weakness that may allow harm to occur to an automated information system or activity
The susceptibility of a population to a specific type of event Vulnerability is also associated with the degree of possible or potential loss from a risk that results from a hazard at a given intensity The factors that influence vulnerability include demographics, the age and resilience of the environment, technology, social differentiation and diversity, as well as regional and global economics and politics vulnerability analysis The assessment of an exposed populations' susceptibility to the adverse health effects of a particular hazard See also hazard; vulnerability
A weakness in information resource security policy, procedure, personnel, management, administration, hardware, software, physical layout, organization, or other factors affecting security that may allow harm to an information resource
A flaw that allows someone to operate a computer system with authorization in excess of that which the system owner specifically granted to him or her
Hardware, firmware, or software flow that leaves an AIS open for potential exploitation A weakness in automated system security procedures, administrative controls, physical layout, internal controls, and so forth, that could be exploited by a threat to gain unauthorized access to information or disrupt critical processing
1) A characteristic of a critical infrastructure's design, implementation, or operation of that renders it susceptible to destruction or incapacitation by a threat 2) A flaw in security procedures, software, internal system controls, or implementation of an IS that may affect the integrity, confidentiality, accountability, and/or availability of data or services Vulnerabilities include flaws that may be deliberately exploited and those that may cause failure due to inadvertent human actions or natural disasters
Short and precise definitions are given by [Schultz Jr et al 1990]: "A vulnerability is a feature or bug in a system or program which enables an attacker to bypass security measures " or [CERT 1993]: "an aspect of a system or network that leaves it open to attack"
Any weakness that could be exploited to violate a system or the information that it contains (Secure EDI)
A vulnerability is the existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system, network, application, or protocol involved
The state of being weak
Susceptibility to attack or injury; being well not defended
A design, implementation, or operation flaw that may be exploited by a threat; the flaw causes the computer system or application to operate in a fashion different from its published specifications, and to result in destruction or misuse of equipment or data
Any characteristic of a computer system that allows an individual to keep it from correctly operating, or that will allow unauthorized users take control of the system A design, administrative, or implementation weakness or flaw in hardware, firmware, or software If exploited, a vulnerability could lead to an unacceptable impact in the form of unauthorized access to information or disruption of critical processing
vulnerabilite
Favorites