- information system vulnerability
- уязвимость информационной системы
English-Russian electronics dictionary .
English-Russian electronics dictionary .
Information Assurance Vulnerability Alert — An Information Assurance Vulnerability Alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD CERT, a division … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
System — (from Latin systēma , in turn from Greek polytonic|σύστημα systēma) is a set of interacting or interdependent entities, real or abstract, forming an integrated whole. The concept of an integrated whole can also be stated in terms of a system… … Wikipedia
vulnerability — In information operations, a systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security… … Military dictionary
System Shock 2 — Developer(s) Irrational Games Looking Glass Studios Publisher(s) Electronic Arts … Wikipedia
Information Technology Security Assessment — (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks. BackgroundIn an assessment, the assessor should have the full cooperation of the organization being assessed. The organization grants access to its… … Wikipedia
Vulnerability (computing) — In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware,… … Wikipedia
Vulnerability scanner — A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. There are a number of types of vulnerability scanners available today, distinguished from one another by a… … Wikipedia
Vulnerability assessment — A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed for include, but are not limited to,… … Wikipedia
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
Information technology security audit — A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system… … Wikipedia