Examples of using Attack surface in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
The attack surface of modern businesses is growing,
the so-called cybersecurity“attack surface” increases.
The Wyse 3040 comes with the virus-resistant Wyse ThinOS software that is ultra-secure with no published APIs and therefore no attack surface.
The security standard CWE requires that code coverage analysis is used to ensure that there is no hidden functionality designed to potentially increase an application's attack surface and expose weaknesses.
presenting new vulnerabilities and increasing the attack surface.
Reducing attack surfaces with application sandboxing is a step in the right direction, but the attack surface remains expansive and sandboxes are clearly still just a speed bump on the road to complete compromise.
The primary goal of User Account Control is to reduce the exposure and attack surface of the Windows 7 operating system by requiring that all users run in standard user mode,
The attack surface will also be reduced thanks to vulnerability management and patch update capacities with Panda Patch Management;
But the size of the attack surface for any decent-sized organization, the number of people,
helps reducing the attack surface of the e-government environment.
security professionals recognize that applications represent the enterprise's largest attack surface, ranging from mobile phones to iPads,
Andrew Mason, a program manager on the Windows Server team, noted that a primary motivation for producing a Server Core variant of Windows Server 2008 was to reduce the attack surface of the operating system, and that about 70% of the security vulnerabilities in Microsoft Windows from the prior five years would not have affected Server Core.
Using Access Control Lists to mitigate threats and minimise attack surfaces.
New attack surfaces- for example,
bandwidth requirements, and attack surfaces, also mean that manual administration of networks is becoming impractical.
the importance of keeping the cyber footprints and attack surfaces of CSDP missions and operations to the necessary minimum;
Reduction of attack surface.
This is your attack surface.
It's also an attack surface.
It has a given attack surface.