52单词网 > 英语词典 > vulnerabilities

vulnerabilities

小编 分享 时间:
vulnerabilities是什么意思
英式音标:[vʌlnərə'bɪlɪtɪz]
美式音标:[vʌlnərə'bɪlɪtɪz]
词义:

释义

脆弱点;

英英释义

vulnerability

n.

the state of being vulnerable or exposed

"his vulnerability to litigation"

同义词:exposure

susceptibility to injury or attack

用法:

词组短语

vulnerability analysis脆弱性分析;弱点分析

双语例句

用作名词(n.)

They found that there are vulnerabilities in every version of every router manufacturer's software, allowing hackers to hijack a router, say.
他们发现在每一个路由器制造商的每一版路由软件中都有脆弱点,可以使黑客入侵路由器。

权威例句

Real Vulnerabilities and Practical Solutions

Using model checking to analyze network vulnerabilities

Sustaining human progress : reducing vulnerabilities and building resilience

Pixy: a static analysis tool for detecting Web application vulnerabilities

Adolescent brain development: a period of vulnerabilities and opportunities. Keynote address.

Small solutions to polynomial equations, and low exponent RSA vulnerabilities

Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities

Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Technical Report)

Human development report 2014 : sustaining human progress: reducing vulnerabilities and building reseilence

Co-occurrence of abuse of different drugs in men: the role of drug-specific and shared vulnerabilities.
同义词:flaws,deficiencies
造句:

1. Every system has vulnerabilities that a knowledgeable thief could theoretically exploit.

每个系统都有漏洞,理论上,具备相关知识的小偷就可以对其加以利用。

youdao

2. Every one of them has vulnerabilities that a knowledgeable thief could theoretically exploit.

每个系统都有漏洞,如果小偷具备相关知识,理论上就可以对其加以利用。

youdao

3. It isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.

并不意外的是,关于受大众喜爱的家庭安全系统具有潜在缺陷,你会发现有许多很有说服力的观点。

youdao

4. So it isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.

因此,你会发现很多关于盛行的家庭安全系统潜在漏洞的强烈意见,这并不奇怪。

youdao

5. Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.

今年几起严重的客户和雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统和业务流程,以寻找可能存在的安全隐患。

youdao

6. We see our own vulnerabilities in them.

我们从他们身上看到了自己的弱点。

youdao

7. A.Determine privacy vulnerabilities.

确定隐私的薄弱环节。

youdao

8. New vulnerabilities and new threats emerge.

出现了新漏洞和新威胁。

youdao

9. This is also one of its vulnerabilities.

这也是在虚拟世界的安全漏洞中的一个。

youdao

10. Next, identify vulnerabilities your project could have.

接下来,需要标识项目可能具有的漏洞。

youdao

11. Such vulnerabilities are called logical vulnerabilities.

一些漏洞被称为逻辑性漏洞。

youdao

12. Guard against Cross-Site Scripting (XSS) vulnerabilities.

保护跨站点脚本(Cross - site scripting,XSS)漏洞。

youdao

13. Such vulnerabilities are also known as control challenges.

这种漏洞也被称为控制的挑战。

youdao

14. You can also use it to test for vulnerabilities on a site.

也可以使用它来测试站点上的漏洞。

youdao

15. Vulnerabilities exist at entry and exit points in the system.

弱点存在于系统的入口和出口。

youdao

16. An attacker can discover vulnerabilities much faster than you think!

攻击者找到漏洞的速度比你想想的快多了。

youdao

17. Poverty and the vulnerabilities associated with it remain entrenched.

贫困及与其如影随形的其他缺陷依旧根深蒂固。

youdao

18. But, there are some vulnerabilities that automated software cannot discover.

但是一些漏洞,自动化软件是发现不了的。

youdao

19. After you assess vulnerabilities, prioritize them according to business risk.

在评估漏洞之后,根据业务风险为其划分优先级。

youdao

20. It cannot defend against vulnerabilities in third-party scripts or servers.

它不能抵御第三方脚本或服务器中的安全漏洞。

youdao

21. WHO is working to address the specific vulnerabilities and health needs of women.

世卫组织正在努力处理妇女的特定脆弱性和卫生需求。

youdao

22. To mitigate these vulnerabilities, you need to conduct a vulnerability assessment.

要缓解这种漏洞,您需要执行漏洞评估。

youdao

23. It equally shows up the projects which are slow to respond to vulnerabilities.

它同时显示了那些对于攻击反应迟钝的项目。

youdao

24. This TAI addresses the security vulnerabilities in the previous TAI and is preferred.

这种TAI解决了前一种TAI的安全漏洞,应该优先选用它。

youdao

25. Some vulnerabilities are not overly complex, and are thus easy for hackers to exploit.

一些脆弱点不太复杂,因而很容易被黑客利用。

youdao

26. Your goal is to mitigate the risks of exploiting vulnerabilities to an acceptable level.

您的目标是将漏洞被利用的风险减轻到可接受的程度。

youdao

27. Most users' knowledge of security vulnerabilities of their systems is vague at best.

大多数使用者对于安全攻击的知识都很匮乏。

youdao

28. When these vulnerabilities are exploited, the system or applications will perform poorly.

如果这些漏洞被人利用,应用程序或系统的性能将受到损害。

youdao

29. When these vulnerabilities are exploited, the system or applications will perform poorly.

如果这些漏洞被人利用,应用程序或系统的性能将受到损害。

youdao

vulnerabilities

将本文的Word文档下载到电脑,方便收藏和打印
推荐度:
点击下载文档文档为doc格式