Skip to Main Content
Apply
Quicklinks
Search
A-Z Index
BengalWeb
Campus Map
Directory
Email
Events
Library
Moodle
News
Give
Admissions
Students
Faculty & Staff
Parents
Alumni & Visitors
Academic Calendar
Academic Catalogs
Administration
Advising
Athletics
Campus Security
Career Center
Class Schedule
Colleges & Departments
Financial Aid
Health & Wellness
Housing
Human Resources
Jobs
Museum of Natural History
Parking
Registrar
Scholarships
Transcripts
Tuition
Majors
Cost
Visit
Parking
Map
Apply
Give
Search
Common Searches
BengalWeb
Bookstore
Academic Calendar
Directory
COVID-19
Jobs
Human Resources
Moodle
Calendar
Tuition
JavaScriptMessages
NIATEC
National Information Assurance Training and Education Center
News
Rss Feeds
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
V
V Model
V7
Vaccines
Vadding
Valid Password
Valid period
Validation
Validation (Testing)
Value of protection
Value Of The Represented
Value-Added Networks
Vanilla
Vannevar
Vaporware
Var
Variable Length Buffer
Variant
VAX
VAXectomy
VAXen
Vaxherd
Vaxism
Vaxocentrism
VBscript
Vdiff
VDT
Veeblefester
Vendor diversity
Vendor Security Analyst
Ventilator Card
Venus Flytrap
Verbage
Verbiage
Verifiable Identification Forwarding
Verification
Verification And Validation Process
Verified Design
Verifier
Version 7
Vgrep
Vi
Victimization software
Video Display Terminal
Video Display Unit
Video recorder
Video Signal
Videotex
Videotext
View
Viewdata
Violation
Violations
Virgin
Virtual
Virtual Call
Virtual Call Capability
Virtual Call Facility
Virtual Carrier Frequency
Virtual Circuit
Virtual Circuit Capability
Virtual Connection
Virtual Friday
Virtual Memory
Virtual Network
Virtual Password
Virtual private network (VPN)
Virtual Reality
Virtual Shredder
Virtual Storage
Virus
Visionary
VMS
Vocoder
Voice
Voice Communications Security
Voice Mail Security
Voice recognition
Voice-Net
Volatile Memory
Volatility
Volume
Voluntary tunneling
Voodoo Programming
VPN (virtual private network)
VR
VSA
VST
VTT
Vulcan Nerve Pinch
Vulnerability
Vulnerability Analysis
Vulnerability Assessment
Vulnerability assessment tools
Vulnerability reporters
Vulnerability testing
Vulnerability testing contract
Vulture Capitalist
Vulnerability Assessment
A review of the susceptibility to loss or unauthorized use of resources, errors in reports and information, illegal or unethical acts, and/or adverse or unfavorable public opinion. (A-123) 2. A measurement of vulnerability which would include: a. The susceptibility of a particular system to a specific attack. b. The opportunity available to a threat agent (methods or things which may be used to exploit a vulnerability(such as fire)) to mount that attack. A vulnerability is always demonstrable but may exist independently of a known threat. In general, a description of a vulnerability takes account of those factors under friendly control. (AR 380-380) 3. A review of the susceptibility to loss or unauthorized use of resources, errors in reports and information, illegal or unethical acts, and adverse or unfavorable public opinion. Vulnerability assessments do not identify weaknesses or result in improvements. They are the mechanism with which an organization can determine quickly the potential for losses in its different programs or functions. The schedule of internal control reviews should be based on the results of the vulnerability assessments. (DODD 7040. 6) 4. The systematic examination of telecommunications to determine the adequacy of COMSEC measures, to identify COMSEC deficiencies, to provide data from which to predict the effectiveness of proposed COMSEC measures, and to confirm the adequacy of such measures after implementation. (NCSC-9) 5. A measurement of vulnerability which includes the susceptibility of a particular system to a specific attack and the opportunities available to a threat agent to mount that attack. (NCSC-TG-004-88)