Examples of using Security weaknesses in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Identify and repair security weaknesses.
In some cases,forensic analysis is not needed to identify vulnerabilities or to correct security weaknesses.
Test APIs and services for common security weaknesses and vulnerabilities.
Further, because e-money is the result of an emerging technology,time may reveal security weaknesses.
Third, organizations should fully expect security weaknesses in emerging technologies.
One of Linux's developers outlines howdevelopers can cope with the programming language's security weaknesses.
This means that finding many software security weaknesses are either impractical or impossible.
FTP was not designed to be a secure protocol,and has many security weaknesses.
Incidents of this nature demonstrate that security weaknesses continue to exist and must be addressed.
Mobile security: IBM/Ponemon study finds enterprise app security weaknesses.
They attempt to bypass security weaknesses to determine exactly how and where the infrastructure can be compromised.
Common web application security weaknesses.
Other widespread security weaknesses, such as flaws in the software update management process, were not considered.
Cyber criminals are well aware of these security weaknesses.
Security weaknesses and breaches in telecommunications, the theft of sensitive data, and even political scandals are becoming increasingly frequent- and serious.
CWE™ is a community-developed list of common software security weaknesses.
By exploiting security weaknesses in the third-party company's system, an intruder allegedly connected to the network numerous times and intercepted personal information.
Wireshark is a network protocol anddata packet analyzer that can fish out security weaknesses in real time.
One of the Linux engineers outlines howdevelopers can cope with the programming language's security weaknesses.
While the principal objective of penetration testing is to determine security weaknesses in an organization's network infrastructure;
Manage the security life cycle of all in-house developed and acquired software in order to prevent, detect,and correct security weaknesses.
CWE(Common Weakness Enumeration) is a list of common security weaknesses identified in software products.
Mobile operating systems are the operating systems that are still in their infancy,so I am not surprised that we often encounter security weaknesses.
It focuses on enumerating differentparts of a Windows machine aiming to identify security weaknesses and point to components that need further hardening.
With regard to constructions and alterations and renovation services, the reduced requirements reflect the planned completion in thecurrent period of projects aimed at addressing the security weaknesses in the mission.
European leaders have called for a worldwideagreement on data protection to address the data security weaknesses of cloud computing.
The networks themselves are expanding,adding more and more communication devices that bring their own security weaknesses with them.
However, this technique still has a security weakness.
Protect your network for any security weakness, yet be able to easily share files and printers.
There was also a problem pointing out the security weakness of the rider sensor.