Glossary entry (derived from question below)
French term or phrase:
créneaux de vulnérabilité
English translation:
security loopholes
Added to glossary by
Silvia Brandon-Pérez
May 10, 2007 23:11
17 yrs ago
1 viewer *
French term
créneaux de vulnérabilité
French to English
Other
IT (Information Technology)
data security
L'Utilisateur s'abstient d'utiliser d'éventuels "créneaux de vulnérabilité" en matière de sécurité et d'en faire publicité.
Proposed translations
(English)
3 +1 | vulnerability gaps (loopholes?) | Silvia Brandon-Pérez |
4 +5 | weak points | Odette Grille (X) |
4 +3 | vulnerability | Johannes Gleim |
2 | windows of vulnerability | Anne Girardeau |
Change log
May 12, 2007 09:31: Silvia Brandon-Pérez changed "Edited KOG entry" from "<a href="/profile/31238">Enza Longo's</a> old entry - "créneaux de vulnérabilité"" to ""security loopholes""
Proposed translations
+1
58 mins
Selected
vulnerability gaps (loopholes?)
A possibility.
Peer comment(s):
agree |
Charles Hawtrey (X)
: Could also be 'security loopholes' or 'looholes in security' depending on which reads better in the final version
11 hrs
|
Yes, that's an excellent suggestion. Thank you, Charles.
|
4 KudoZ points awarded for this answer.
Comment: "many thanks to you and to Charles! see my note as to the definition of 'security loopholes""
+5
2 hrs
weak points
...
Note from asker:
many thanks for your input, Odette but I believe that security loopholes is the way to go. |
Peer comment(s):
agree |
Julie Barber
4 hrs
|
Merci Julie
|
|
agree |
Miranda Joubioux (X)
: I like this option
4 hrs
|
Thank you Miranda
|
|
agree |
Alanna Wilson-Duff
4 hrs
|
Merci Alanna
|
|
agree |
Emma Paulay
: The most English sounding
6 hrs
|
Thank you Emma
|
|
agree |
cristina estanislau
8 hrs
|
8 hrs
windows of vulnerability
Just a suggestion, here, just as there are "windows of opportunity", there could be "windows of vulnerability", ...?
Note from asker:
many thanks for your input, Anne but I believe that security loopholes is the way to go. |
+3
1 hr
vulnerability
Combining
http://dict.leo.org/frde?lp=frde&lang=de&searchLoc=0&cmpType...
with
http://dict.leo.org/ende?lp=ende&lang=de&searchLoc=0&cmpType...
leads to
vulnerability (weak spots)
''Taiwan Quake Exposes Internet Vulnerability''
Nevertheless, it disrupted telecommunication networks in Asia severely and exposed a vulnerable "choke point" in the network of fiber-optic cables that form the physical layer of the Internet.
http://www.pinr.com/report.php?ac=view_report&report_id=602&...
7.0 SYSTEM VULNERABILITY ASSESSMENT
Vulnerability assessment is a key component of a risk assessment, intended to identify system vulnerabilities and determine the likelihood of exploitation of those vulnerabilities.
7.1 Technical Vulnerability
7.2 Personnel Vulnerability
7.3 Telecommunication Vulnerability
7.4 Software Vulnerability
http://www.usdoj.gov/jmd/irm/lifecycle/appendixc17.htm
The user should not disclose any vulnerable points in the system.
--------------------------------------------------
Note added at 8 Stunden (2007-05-11 07:59:24 GMT)
--------------------------------------------------
Also Hits for "vulnerable points" (104.000 Google hits):
The technology is designed to protect against intrusions and malware. StillSecure CTO Mitchell Ashley learned a great deal about the vulnerable points in the corporate network during the company's research and development cycle for this and other recently released products.
http://www.technewsworld.com/story/46783.html
As a solution to the third step, we propose to use our toolkit to identify vulnerable points in the network and present defense mechanisms to protect the network.
http://www.cse.psu.edu/~kotapati/index_files/Research.html
http://dict.leo.org/frde?lp=frde&lang=de&searchLoc=0&cmpType...
with
http://dict.leo.org/ende?lp=ende&lang=de&searchLoc=0&cmpType...
leads to
vulnerability (weak spots)
''Taiwan Quake Exposes Internet Vulnerability''
Nevertheless, it disrupted telecommunication networks in Asia severely and exposed a vulnerable "choke point" in the network of fiber-optic cables that form the physical layer of the Internet.
http://www.pinr.com/report.php?ac=view_report&report_id=602&...
7.0 SYSTEM VULNERABILITY ASSESSMENT
Vulnerability assessment is a key component of a risk assessment, intended to identify system vulnerabilities and determine the likelihood of exploitation of those vulnerabilities.
7.1 Technical Vulnerability
7.2 Personnel Vulnerability
7.3 Telecommunication Vulnerability
7.4 Software Vulnerability
http://www.usdoj.gov/jmd/irm/lifecycle/appendixc17.htm
The user should not disclose any vulnerable points in the system.
--------------------------------------------------
Note added at 8 Stunden (2007-05-11 07:59:24 GMT)
--------------------------------------------------
Also Hits for "vulnerable points" (104.000 Google hits):
The technology is designed to protect against intrusions and malware. StillSecure CTO Mitchell Ashley learned a great deal about the vulnerable points in the corporate network during the company's research and development cycle for this and other recently released products.
http://www.technewsworld.com/story/46783.html
As a solution to the third step, we propose to use our toolkit to identify vulnerable points in the network and present defense mechanisms to protect the network.
http://www.cse.psu.edu/~kotapati/index_files/Research.html
Note from asker:
many thanks for your input, Johannes but I believe that security loopholes is the way to go. |
Peer comment(s):
agree |
Julie Barber
5 hrs
|
Thank you
|
|
agree |
Alanna Wilson-Duff
5 hrs
|
Thank you
|
|
agree |
Natasha Dupuy
: I would definitely use "vulnerable points" in this context
6 hrs
|
That's no bad idea.
|
|
neutral |
writeaway
: Ok-you hid your German answer-too bad you didn't follow my suggestion and use weak points. someone else did. I prefer it to vulernabile points
8 hrs
|
Discussion
security loophole Definition: TechEncyclopedia from TechWeb
security loophole - A vulnerability in software, typically in the operating system, that enables an attacker to compromise the system.
www.techweb.com/encyclopedia/defineterm.jhtml?term=security... - 27k - Cached - Similar pages