1 |
VulnerabilityFlaw or weakness which, if exploited, may result in an intentional or unintentional compromise of a system.
|
2 |
VulnerabilityA weakness in the design, implementation, operation or internal control of a process that could expose the system to adverse threats from threat events
|
3 |
VulnerabilityVulnérabilité
|
4 |
Vulnerability1767, noun from vulnerable (q.v.).
|
5 |
Vulnerabilitycapability of being hurt.
|
6 |
VulnerabilityRisk and vulnerability are often used interchangeably: however, in some contexts, the terms have related but separate meanings. While risk is often used to describe the likelihood of an event happeni [..]
|
7 |
Vulnerabilitythe state of being vulnerable or exposed; "his vulnerability to litigation"; "his exposure to ridicule" susceptibility to injury or attack (vulnerab [..]
|
8 |
VulnerabilityThe degree to which a system is susceptible to, or unable to cope with, adverse effects of climate change, including climate variability and extremes. Vulnerability is a function of the character, magnitude, and rate of climate variation to which a system is exposed; its sensitivity; and its adaptive capacity. [15]
|
9 |
VulnerabilityIn communications security, see susceptibility. 2. The extent to which a system will degrade when subjected to a specified set of environmental conditions. 3. In communications interference, see susceptibility threshold. 4. In cryptology, the point of weakness within the encrypted system where threats can occur, such as equipment, facilities, hardw [..]
|
10 |
Vulnerabilitysusceptibility to cultivating a disorder, condition, or illness whenever exposed to particular substances or conditions.
|
11 |
VulnerabilityVulnerability refers to a person's, or group of people's, risk of being hurt. This can mean that the person or population exists without physical or legal safeguards that limits or prevents [..]
|
12 |
VulnerabilityAny weakness that can be exploited by an adversary to gain access to an asset.
|
13 |
VulnerabilityVulnerability is the degree to which a system is susceptible to, and unable to cope with, adverse effects of climate change, including climate variability and extremes. Vulnerability is a function of [..]
|
14 |
VulnerabilityThe characteristics and circumstances of a community, system or asset that make it susceptible to the damaging effects of a hazard. Comment: There are many aspects of vulnerability, arising from various physical, social, economic, and environmental factors. Examples may include poor design and construction of buildings, inadequate protection of ass [..]
|
15 |
VulnerabilityA set of conditions and processes resulting from physical, social, economic and environmental factors, indicating the susceptibility of a community to the impact of hazards (IUCN, 2011: Definitions).
|
16 |
Vulnerabilityrefers to a known weakness in a piece of software that could potentially be exploited by an attacker. Software developers generally test for vulnerabilities and release patches to fix them. See also e [..]
|
17 |
VulnerabilityFlaws or security holes in a program
|
18 |
Vulnerability(n) the state of being vulnerable or exposed(n) susceptibility to injury or attack
|
19 |
Vulnerability(English) The degree to which people, property, habitats, or species may be damaged by or unable to cope with the negative effects of events such as climate change and sea-level rise.
|
20 |
VulnerabilityThe degree to which physical, biological, and socio-economic systems are susceptible to and unable to cope with adverse impacts of climate change.
|
21 |
VulnerabilityA physical feature or operational attribute that renders an entity open to exploitation or susceptible to a given hazard. (NIPP, DHS Risk Lexicon)
|
22 |
Vulnerability A flaw or weakness that can be used to attack a system or organization.
|
23 |
VulnerabilityIn both computing and WordPress, a vulnerability is a bug in the system’s security that when exploited allows the attackers to either gain unauthorized access to a system and its data, or hijack a user session. There are two types of vulnerabilities; technical and logical ones. Typically, technical vulnerabilities can be found automatically and are [..]
|
24 |
VulnerabilityIn computer security, the word vulnerability refers to a weakness in a system or PC that allows an attacker to violate the confidentiality, integrity or availability of a system or PC.
|
25 |
VulnerabilityA flaw that allows someone to operate a computer system with authorization levels in excess of that which the system owner specifically granted.
|
26 |
Vulnerability"An occurrence of a weakness (or multiple weaknesses) within software, in which the weakness can be used by a party to cause the software to modify or access unintended data, interrupt proper exe [..]
|
27 |
Vulnerabilitygoogle_ad_client="pub-8027288574377500";google_ad_slot="1043341745";google_ad_width=120;google_ad_height=600; Definition: A Vulnerability is a weakness in the information infrastru [..]
|
28 |
VulnerabilityA flaw, bug or misconfiguration that can be exploited to gain unauthorised access to a network or information.
|
29 |
VulnerabilityThe degree of susceptibility and resilience of an agency to hazards.
|
30 |
VulnerabilityA hardware, firmware, or software flaw that leaves an information system open to potential exploitation; a weakness in automated system security procedures, administrative controls, physical layout, i [..]
|
31 |
VulnerabilityAny flaw in the software, hardware, or configuration of a computing device that can be used to compromise the security of a university information resource
|
32 |
VulnerabilityA vulnerability is a system weakness which can be exploited by an attacker. A list of recent, known vulnerabilities can be found on the Security Alerts page
|
33 |
VulnerabilityThe exposure of a habitat community or individual (or individual colony) to an external factor to which it is sensitive (Hiscock, 1996).
|
34 |
VulnerabilityThe degree to which a system (region, community) is unable to cope with adverse effects of climate change. Vulnerability is a function of the character, magnitude, and rate of climate variation to whi [..]
|
35 |
VulnerabilityVulnerability is the weakest link of an asset or a group of assets that can be exploited by one or more imminent dangers (developer's mistake, wrong installation). In most cases vulnerability is [..]
|
36 |
VulnerabilityVulnerabilities are bugs in software programs that hackers exploit to infect computers.
|
37 |
Vulnerabilitythe degree to which animals are vulnerable to physical disturbance
|
38 |
Vulnerabilitythe conditions determined by physical, economic, environmental factors or processes that increase the susceptibility of an institution to the impact of realized hazards
|
39 |
VulnerabilityVulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set [..]
|
40 |
VulnerabilityVulnerability is viewed by many researchers as "a set of characteristics or circumstances, which predispose an individual to manifest problems in adaptation". Other researchers differentiate [..]
|
41 |
VulnerabilityAn inherent weakness of a piece of software or operating system that allows hackers to gain access to the system. See Back Door above.
|
42 |
VulnerabilityThe context of environmental risk; A place’s vulnerability is operationalized by the spatial influences of nearby features.
|
43 |
VulnerabilityWeakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.
|
44 |
VulnerabilityWeakness in an information system, system security procedures, internal controls, or implementation that could be exploited.
|
45 |
VulnerabilityThe condition of being subject to greater undertrick penalties and eligible to receive greater premiums as provided by the scoring table. In rubber bridge, vulnerability comes about by having won one [..]
|
46 |
VulnerabilityThe state (being vulnerable or not) of being subject to greater penalties and of receiving greater game/slam bonuses when vulnerable as opposed to non-vulnerable. In Rubber Bridge one becomes vulnerab [..]
|
47 |
Vulnerabilitystatement of which side, if any, is vulnerable
|
48 |
VulnerabilityThe status of the deal during a round of bridge which affects the size of the bonuses awarded for making or defeating contracts. Bonuses and penalties are higher when declarer's side is vulnerabl [..]
|
49 |
VulnerabilityThis term refers to physical, social, economic and environmental factors or processes that increase the susceptibility of a community or individuals to difficulties and hazards and put them at risk as a result of loss, damage, insecurity, suffering and death. Some people may be disproportionately affected by disruption of their physical environment [..]
|
50 |
Vulnerabilityweak points in information systems that may be used by external threats.
|
51 |
VulnerabilityA weakness (or weaknesses) in an IS [information system], system security procedures, internal controls, or implementation that could be exploited. {Source: NSTISSI No. 1000} (USAID Automated Directiv [..]
|
52 |
VulnerabilityExtent to which a community, structure or service is likely to be damaged or disrupted by a disaster. Disaster
|
53 |
Vulnerability1) "Vulnerability" refers to a substantial incapacity to protect one's own interests owing to such impediments as lack of capability to give informed consent, lack of alternativ [..]
|
54 |
VulnerabilityThe changing state by which one judges how likely a community or individual is to
|
55 |
VulnerabilityThe degree of sensitivity to the impact of hazards.
|
56 |
VulnerabilityThe characteristics of a person, group, or an ecosystem and their situation that influence their capacity to anticipate, cope with, resist and recover from the impact of a (natural) hazard (adapted fr [..]
|
57 |
VulnerabilityThe propensity of social or ecological systems to suffer harm from external stresses and perturbations. Involves the combination of sensitivity to exposures and adaptive measures to anticipate and red [..]
|
58 |
VulnerabilityIn computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.
To exploit a vulnerabilit [..]
|
59 |
VulnerabilityVulnerability refers to the inability (of a system or a unit) to withstand the effects of a hostile environment. A window of vulnerability (WOV) is a time frame within which defensive measures are dim [..]
|
<< VPN | WAN >> |