Security Vulnerability definition

Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.
Security Vulnerability means any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of a security control. 6 U.S.C. 1501(17)
Security Vulnerability. ’ means any attribute of hard-

Examples of Security Vulnerability in a sentence

  • While no software can be guaranteed to be free from Security Vulnerabilities, if a Security Vulnerability is discovered, Motorola will take the steps set forth in Section 6 of this Agreement.

  • Furthermore, Contractor will provide an action plan for final resolution of such Security Incident or Security Vulnerability within one week of the date of such Security Incident or Security Vulnerability and complete remediation of such Security Incident or Security Vulnerability must be completed at Contractor’s expense.

  • Improving the Adoption of Dynamic Web Security Vulnerability Scanners, 2015.

  • The generic and specific guidelines issued by State & Central Government IT departments with respect to Hosting, Security, Vulnerability etc., have to be adopted and implemented during the tenure of the project.

  • T2 (2) Was needed water system equipment in place and functioning properly at the time of survey?Adequate security: locked fence around wells/treatment plant/tank (6' or 5' + barbed wire at top), locked hatches on water storage tanks (operator verifies), Security Vulnerability Self-Assessment and Emergency Response Plan, both updated annually.


More Definitions of Security Vulnerability

Security Vulnerability means any attribute of hardware, software,
Security Vulnerability means a state in the design, coding, implementation, operation or management of a Deliverable that allows an attack by a party that could result in unauthorized access or exploitation, including without limitation (1) access to, controlling or disrupting operation of a system; (2) access to, deleting, altering or extracting data or (3) changes of identity, authorizations or permissions of users or administrators. A Security Vulnerability may exist regardless of whether a Common Vulnerabilities or Exposures (CVE) ID or any other scoring or official classification has been assigned to it.
Security Vulnerability means a weakness or flaw in a product or system's design, operation or implementation that could be exploited by an attacker to violate the product or system's security or privacy policies, including, without limitation, a flaw that makes it infeasible, even when the product is properly used, to prevent an attacker from usurping privileges on a user's system, compromising its data, security or other operational features. If You become aware that your applications can cause a Security Vulnerability, You agree to (1) immediately notify Intel, (2) take immediate measures to stop the distribution of Your Product, (3) promptly correct such Security Vulnerability and (4) indemnify and hold harmless Intel for any claims that may be alleged against Intel due to such Security Vulnerability.
Security Vulnerability means any flaw or weakness in system security procedures, design, implementation, or internal controls that if exercised (accidentally triggered or intentionally exploited) could result in a security breach such that data is compromised, manipulated, or stolen, or a system is damaged. “Software” (i) means proprietary software in executable code format, and adaptations, translations, de-compilations, disassemblies, emulations, or derivative works of such software; (ii) means any modifications, new versions and new releases of the software provided by Xxxx; (iii) means any upgrades, enhancements or other functions or features to the Software provided by Xxxx; and (iv) may contain one or more items of software owned by a third-party supplier. The term "Software" includes the applicableSoftware Key” and does not include any third-party software provided under separate license or not licensable under the terms of this Agreement.
Security Vulnerability has the meaning stated in Paragraph 4 of Appendix B.
Security Vulnerability means a weakness in software code, a product or a system that leaves it open to the potential for exploitation in the form of unauthorized access or malicious behaviour. “Service Hours”, “SH” means the service hours purchased by the Customer in the applicable Order. "Service Levels" means the service levels set out in sections 4.4 and 5.9 below. “Software” means the IFS Software and/or CB Apps Software. “Support Ticket” means a Customer request for support initiated by the Customer through the CB Ticket Portal. "Ticket Portal" means the CB ticketing system where Customer's nominated contacts will submit Support Tickets. “Updates” means a cumulative set of fixes and improvements for a release. Updates are compatible with a specific release of the Software as designated by IFS and/or CB and released in accordance with their release schedule as applicable from time to time. "Workaround" means reducing or eliminating the impact of a Defect for which a full resolution is not yet available, normally in agreement with the Customer. For Priority 1 and 2 Defects a workaround would mean a solution where the Defect is no longer Priority 1 or 2.
Security Vulnerability means a f law or weakness in sy stem security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.