@websec007
        
        2020-01-19T03:04:38.000000Z
        字数 3272
        阅读 1529
    English
/ˈpraɪ.və.si/
e.g.: The law is designed (to protect people's privacy)e.g.: Privacy Policy Acceptance
e.g. I hate sharing a bedroom - I never get any privacy`
/ˈmæt̬.ɚ/
e.g. Could I talk to you about a personal matter ?
e.g. He earned certification to fly single-engine aircraft.
/ˈtrɪɡ.ɚ/
e.g. It's not clear who actually pulled the trigger.

e.g. A Vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature
/ɑːˌθen.t̬əˈkeɪ.ʃən/
e.g. password/biometric authentication
/ˌɑː.θɚ.əˈzeɪ.ʃən/
The authorization to sell the shares(股票) arrived too late.
/səˈver.ə.t̬i/
seriousness
e.g. 使用举例
| Last 20 Scored Vulnerability IDs & Summaries | CVSS Severity | 
|---|---|
| CVE-2019-19333 | V3.1: 9.8 CRITICAL | 
| CVE-2019-19333 | V2: 7.5 HIGH | 
/səˈvɪr/
- causing very great pain, difficulty, worry, damage, etc.; very serious.
This will be a severe test of our strength
| 单词 | 发音 | 例句/解释 | 
|---|---|---|
| malware | /ˈmæl.weər/ | Malware is short for "malicious software" | 
| Malicious | /məˈlɪʃ.əs/ | intended to harm or upset other people | 
| assessment | ||
| treatment | ||
| implementation | /ɪmpləmɛnˈteɪʃən/ | Risk assessment and treatment are certainly the most complex parts of ISO 27001 implementation | 
| impersonation | He was returned to prison in 1977 for impersonating a police officer | |
| malfunction | /mælˈfʌŋkʃn/ | the coffee maker malfunctioned | 
| abuse | /əˈbjuːz/ | Privilege abuse | 
| theft | /θeft/ | Theft is the crime of stealing. | 
| handle | How management should handle information security | |
| Diagram | /ˈdaɪəɡræm/ | a diagram of the wiring system | 
| chart | 图,曲线图 | where does he belong in an org chart? | 
| Changed by | ||
| Last modified | ||
| Category | ||
| Justification | ||
| Intercation | ||
| Priority | ||
| consquences | How to assess consquences and likelihood in risk analysis? | |
| likelihood | likely + hood | 
/ˈskedʒ.uːl/
e.g. Everything went according to schedule
e.g. The meeting has been scheduled for tomorrow afternoon.e.g. The film is scheduled to begin production in August.
/ɪnˈroʊl/
e.g. ENROLL FOR FREE.e.g. Enroll in security awareness training.e.g. She enroll in English.
| 单词 | 词意 | 例句 | 
|---|---|---|
| workload | ||
| is rife with | ||
| malicious | ||
| Transform | ||
| sign up | ||
| design | ||
| redesign | ||
| fundamentally | ||
| achieved | ||
| optimal | ||
| reside | ||
| pros | ||
| prior knowledge | 提前知道 | no prior knowledge is needed. | 
| instill confidence | ||
| someone else | 其他人 | |
| activity | 活动 | |
| accept / decline | 接受/决绝/ | If you decline, your information won’t be tracked when you visit this website. | 
| preference | 偏爱 | Update your mail preference. | 
| reference | ||
| identify /identified | ||
| verify / verified | ||
| certify / certified | The identity of this web site (cannot be verified). | |
| integrity | the integrity of this connection (cannot be verified). | |
| identity | 身份 | the identity of this web site (cannot be verified) | 
| authority | view the certificate to whether you want to trust the certifying authority | |
| certificate | 证书 | This CA ROOT certificate wat not trusted. | 
The advantage of booking tickets in advance is that you get better seats.