JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
V
V Model
V7
Vaccines
Vadding
Valid Password
Valid period
Validation
Validation (Testing)
Value of protection
Value Of The Represented
Value-Added Networks
Vanilla
Vannevar
Vaporware
Var
Variable Length Buffer
Variant
VAX
VAXectomy
VAXen
Vaxherd
Vaxism
Vaxocentrism
VBscript
Vdiff
VDT
Veeblefester
Vendor diversity
Vendor Security Analyst
Ventilator Card
Venus Flytrap
Verbage
Verbiage
Verifiable Identification Forwarding
Verification
Verification And Validation Process
Verified Design
Verifier
Version 7
Vgrep
Vi
Victimization software
Video Display Terminal
Video Display Unit
Video recorder
Video Signal
Videotex
Videotext
View
Viewdata
Violation
Violations
Virgin
Virtual
Virtual Call
Virtual Call Capability
Virtual Call Facility
Virtual Carrier Frequency
Virtual Circuit
Virtual Circuit Capability
Virtual Connection
Virtual Friday
Virtual Memory
Virtual Network
Virtual Password
Virtual private network (VPN)
Virtual Reality
Virtual Shredder
Virtual Storage
Virus
Visionary
VMS
Vocoder
Voice
Voice Communications Security
Voice Mail Security
Voice recognition
Voice-Net
Volatile Memory
Volatility
Volume
Voluntary tunneling
Voodoo Programming
VPN (virtual private network)
VR
VSA
VST
VTT
Vulcan Nerve Pinch
Vulnerability
Vulnerability Analysis
Vulnerability Assessment
Vulnerability assessment tools
Vulnerability reporters
Vulnerability testing
Vulnerability testing contract
Vulture Capitalist
Vulnerability
A weakness in automated system security procedures, administrative controls, internal controls, and so forth, that could be exploited by a threat to gain unauthorized access to information or disrupt critical processing. (AFR 700-10;; AFR 205-16;; AR 380-380;) 2. A weakness in system security procedures, hardware design, internal controls, etc. , which could be exploited to gain unauthorized access to classified or sensitive information. (NCSC-WA-001-85;) 3. A weakness in the physical layout, organization, procedures, personnel, management, administration, hardware, or software that may be exploited to cause harm to the ADP system or activity. The presence of a vulnerability does not in itself cause harm; a vulnerability is merely a condition or set of conditions that may allow the ADP system or activity to be harmed by an attack. (OPNAVINST 5239. 1A;) 4. An assertion primarily concerning entities of the internal environment (assets); we say that an asset (or class of assets) is vulnerable (in some way, possibly involving an agent or collection of agents); we write: V(i,e) where: e may be an empty set. (ET;) 5. Susceptibility to various threats. (RM;) 6. A set of properties of a specific internal entity that, in union with a set of properties of a specific external entity, implies a risk. (MK;) 7. The characteristics of a system which cause it to suffer a definite degradation (incapability to perform the designated mission) as a result of having been subjected to a certain level of effects in an unnatural (manmade) hostile environment. (JP 1-02) (AF MAN 33-270)