answersLogoWhite

0

i want the answer not answering my own questions . you filthy

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

A vulnerability of web based application?

what a vulnerability of web based application


what mean vulnerability of web based application?

If the application is succeptible to internet attacks


What is a vulnerability of ActiveX?

ActiveX controls can modify the properties of objects in an application.


What is a vulnerability of Active X?

Active X controls can modify the properties of objects in an application. AGNugent


Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps?

Nessus


What risks threats and vulnerability did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability?

Risk assessments evaluate the sensitivity and critical of the system or application data to the vulnerabilities, threats, impacts, and potential countermeasures that may exist in its environment.


Application of management principles flow from?

Could be strategic planning process, or maybe vulnerability assessment. Wait no, it's Six Sigma I think . . . not sure are you?


What is defined as a weakness that can be exploited by and adversary?

Vulnerability


What is a vulnerability scan?

A vulnerability scan is the automated process of proactively identifying vulnerabilities of software and computing systems in a network to determine if and where a system or network can be exploited and/or threatened. Vulnerability scanning usually employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to improve the network's overall security posture. The primary goal of a vulnerability scan is to reduce the vulnerability of a software application, a database, a computer, or a network of computers to hacking, denial of service, infection, and other security risks.


What vulnerability did Odysseus have?

His vulnerability, as far as I know, is immortal women.


What is the so what factor of risk assesment in the OPSEC process?

vulnerability


What is vulnerability in childcare?

Vulnerability in child care refers to the exposure or the risk of the children to something.