Cybersecurity vulnerability definition

Cybersecurity vulnerability means a deficiency within computer hardware or software, or within a computer network or information system, that could be exploited by unauthorized parties for use against an individual computer user or a computer network or information system.
Cybersecurity vulnerability means any vulnerability in a computer or computer system that can be exploited by one or more cybersecurity threats;
Cybersecurity vulnerability means a deficiency within computer hardware or

Examples of Cybersecurity vulnerability in a sentence

  • The contractor shall conduct Cybersecurity vulnerability scans on the MSD-V4L System architecture utilizing an approved Security Content Automation Protocol (SCAP) scanner to determine if there are any vulnerabilities or non-conformance to the STIG in the system.

  • Syed R (2020) Cybersecurity vulnerability management: A conceptual ontol- ogy and cyber intelligence alert system.

  • The contractor shall conduct an Initial Baseline Cybersecurity vulnerability scan fifteen (15) days prior to TRR.

  • Completion of a program of study and research as planned by the Graduate Program Coordinator in the student's major department or college and the Supervisory Committee, with a minimum cumulative GPA of 3.00 and a minimum of 2.7 or CR in each course that is counted toward graduate degree requirements.

  • In this study, validation was done to check if the developed model could assess Cyber-security vulnerability in County Governments in Kenya (Pressman, 2004).

  • Cybersecurity vulnerability threats advance at the same pace as new technology developments.

  • Of this amount $0 and $0.6 million remained unpaid as of December 31, 2003 and 2002, respectively.

  • The definition of independence and associated provisions included in the Instrument have been derived from both the rules promulgated by the SEC in response to the Sarbanes-Oxley Act and the corporate governance rules issued by the NYSE.

  • Cybersecurity vulnerability information is gathered and interpreted for the function, at least in an ad hoc manner[SI.L2-3.14.1][SI.L2-3.14.3] c.

  • Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis.

Related to Cybersecurity vulnerability

  • Interoperability means the ability of a Qwest OSS Function to process seamlessly (i.e., without any manual intervention) business transactions with CLEC's OSS application, and vice versa, by means of secure exchange of transaction data models that use data fields and usage rules that can be received and processed by the other Party to achieve the intended OSS Function and related response. (See also Electronic Bonding.)

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.