product vulnerability

A set of conditions that violates an implied or explicit security policy. A product vulnerability is normally addressed by a Microsoft security bulletin or a service pack.
ثغرة أمنية في المنتج

English-Arabic terms dictionary. 2015.

Look at other dictionaries:

  • Product lining — is the marketing strategy of offering for sale several related products. Unlike product bundling, where several products are combined into one, lining involves offering several related products individually. A line can comprise related products… …   Wikipedia

  • vulnerability — In information operations, a systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security… …   Military dictionary

  • National Vulnerability Database — The National Vulnerability Database is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management,… …   Wikipedia

  • Retina Vulnerability Assessment Scanner — is a vulnerability scanner created by eEye Digital Security that remotely scans a network for security vulnerabilities and assigns a level of threat to those discovered. It is only intended for corporate or government use. Purchase or evaluation… …   Wikipedia

  • Economics of global warming — This article describes the economics of global warming and climate change. Contents 1 Definitions 2 Climate change science 3 Scenarios 4 Trends and projections …   Wikipedia

  • Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… …   Wikipedia

  • Speed dial — Содержание 1 Отображение страниц 1.1 Масштаб страницы 1.2 Подогнать по ширине 1.3 …   Википедия

  • Достоинства браузера Opera — Содержание 1 Отображение страниц 1.1 Масштаб страницы 1.2 Подогнать по ширине 1.3 …   Википедия

  • Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… …   Wikipedia

  • Zero day attack — A zero day (or zero hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses. Zero day… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.