Vulnerability (computing) — In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware,… … Wikipedia
Vulnerability scanner — A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. There are a number of types of vulnerability scanners available today, distinguished from one another by a… … Wikipedia
Program on Intrastate Conflict and Conflict Resolution — The Program on Intrastate Conflict and Conflict Resolution is a program of the Belfer Center for Science and International Affairs at Harvard’s Kennedy School of Government, Cambridge, Massachusetts. The program analyzes the causes of ethnic,… … Wikipedia
Windows Metafile vulnerability — The Windows Metafile vulnerability is a security vulnerability in Microsoft Windows NT based operating systems which has been used in a variety of exploits since late December 2005. The vulnerability was first discussed in the computer security… … Wikipedia
Information Assurance Vulnerability Alert — An Information Assurance Vulnerability Alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD CERT, a division … Wikipedia
Information Security Automation Program — The Information Security Automation Program (ISAP, pronounced “I Sap”) is a U.S. government multi agency initiative to enable automation and standardization of technical security operations. While a U.S. government initiative, its standards based … Wikipedia
Open Vulnerability and Assessment Language — (OVAL) is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL… … Wikipedia
National Vulnerability Database — The National Vulnerability Database is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management,… … Wikipedia
Comprehensive Program for Socialist Economic Integration — Main article: History of the Comecon The Comprehensive Program for Socialist Economic Integration was set up in 1971, and laid the guidelines for Comecon activity until 1990. The distinction between market relations and planned relations made in… … Wikipedia
Conservation security program — The Conservation Security Program was established under the 2002 Farm Security and Rural Investment Act (FSRIA). The Act amended the Food Security Act of 1985 to authorize the program. The Conservation Security Program is administered by the… … Wikipedia