network vulnerability

network vulnerability
уязвимость сети

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужно сделать НИР?

Смотреть что такое "network vulnerability" в других словарях:

  • Network vulnerability scan — Network vulnerability scans are scans used to determine vulnerabilities in a network. A scan can be used by security experts to protect the security of a network, such as that of a company, from an outside attack. Hackers may use a scan to find… …   Wikipedia

  • Network Admission Control — (NAC) refers to Cisco s version of Network Access Control, which restricts access to the network based on identity or security posture. When a network device (switch, router, wireless access point, DHCP server, etc.) is configured for NAC, it can …   Wikipedia

  • Vulnerability scanner — A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. There are a number of types of vulnerability scanners available today, distinguished from one another by a… …   Wikipedia

  • Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… …   Wikipedia

  • Network enumerating — is a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved. It should not be confused with Network mapping which only retrieves information about which servers are connected to a… …   Wikipedia

  • Network address translation — NAT redirects here. For other uses, see Nat (disambiguation). In computer networking, network address translation (NAT) is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device. The… …   Wikipedia

  • Network enumerator — A Network enumerator or network scanner is a computer program used to retrieve user names, and info on groups, shares and services of networked computers. This type of program scans networks for vulnerabilities in the security of that network. If …   Wikipedia

  • Windows Metafile vulnerability — The Windows Metafile vulnerability is a security vulnerability in Microsoft Windows NT based operating systems which has been used in a variety of exploits since late December 2005. The vulnerability was first discussed in the computer security… …   Wikipedia

  • Information Assurance Vulnerability Alert — An Information Assurance Vulnerability Alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD CERT, a division …   Wikipedia

  • Social vulnerability — Research on social vulnerability to date has stemmed from a variety of fields in the natural and social sciences. Each field has defined the concept differently, manifest in a host of definitions and approaches (Blaikie, Cannon et al. 1994;… …   Wikipedia

  • The Wisdom Television Network — The Wisdom Television Network. [Note to contributors: This article would benefit greatly from accounts of employees within the failed cable TV and Radio network. There are many departments and areas of the network that could be discussed from a… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»