正在加载图片...
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of security breaches 10.1.2 KINDS OF SECURITY BREACHES In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data. modification of data. or denial of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm 在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式; 暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机 脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。 《什第机专出美语 10-6Chapter 10 Computer and Network Security 计算机专业英语 10-6 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or denial of legitimate access to computing . A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. 在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式; 暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机。 脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有