JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
V
V Model
V7
Vaccines
Vadding
Valid Password
Valid period
Validation
Validation (Testing)
Value of protection
Value Of The Represented
Value-Added Networks
Vanilla
Vannevar
Vaporware
Var
Variable Length Buffer
Variant
VAX
VAXectomy
VAXen
Vaxherd
Vaxism
Vaxocentrism
VBscript
Vdiff
VDT
Veeblefester
Vendor diversity
Vendor Security Analyst
Ventilator Card
Venus Flytrap
Verbage
Verbiage
Verifiable Identification Forwarding
Verification
Verification And Validation Process
Verified Design
Verifier
Version 7
Vgrep
Vi
Victimization software
Video Display Terminal
Video Display Unit
Video recorder
Video Signal
Videotex
Videotext
View
Viewdata
Violation
Violations
Virgin
Virtual
Virtual Call
Virtual Call Capability
Virtual Call Facility
Virtual Carrier Frequency
Virtual Circuit
Virtual Circuit Capability
Virtual Connection
Virtual Friday
Virtual Memory
Virtual Network
Virtual Password
Virtual private network (VPN)
Virtual Reality
Virtual Shredder
Virtual Storage
Virus
Visionary
VMS
Vocoder
Voice
Voice Communications Security
Voice Mail Security
Voice recognition
Voice-Net
Volatile Memory
Volatility
Volume
Voluntary tunneling
Voodoo Programming
VPN (virtual private network)
VR
VSA
VST
VTT
Vulcan Nerve Pinch
Vulnerability
Vulnerability Analysis
Vulnerability Assessment
Vulnerability assessment tools
Vulnerability reporters
Vulnerability testing
Vulnerability testing contract
Vulture Capitalist
Vulnerability Assessment
A review of the susceptibility to loss or unauthorized use of resources, errors in reports and information, illegal or unethical acts, and/or adverse or unfavorable public opinion. (A-123) 2. A measurement of vulnerability which would include: a. The susceptibility of a particular system to a specific attack. b. The opportunity available to a threat agent (methods or things which may be used to exploit a vulnerability(such as fire)) to mount that attack. A vulnerability is always demonstrable but may exist independently of a known threat. In general, a description of a vulnerability takes account of those factors under friendly control. (AR 380-380) 3. A review of the susceptibility to loss or unauthorized use of resources, errors in reports and information, illegal or unethical acts, and adverse or unfavorable public opinion. Vulnerability assessments do not identify weaknesses or result in improvements. They are the mechanism with which an organization can determine quickly the potential for losses in its different programs or functions. The schedule of internal control reviews should be based on the results of the vulnerability assessments. (DODD 7040. 6) 4. The systematic examination of telecommunications to determine the adequacy of COMSEC measures, to identify COMSEC deficiencies, to provide data from which to predict the effectiveness of proposed COMSEC measures, and to confirm the adequacy of such measures after implementation. (NCSC-9) 5. A measurement of vulnerability which includes the susceptibility of a particular system to a specific attack and the opportunities available to a threat agent to mount that attack. (NCSC-TG-004-88)