vulnerable node

vulnerable node

Mentioned in ?
References in periodicals archive ?
Terrorists are able to intrude into a system connected to critical infrastructure through the most vulnerable node among numerous nodes of allied nations.
Initially vulnerable nodes are identified based on analysis of the input traffic by comparing the current traffic with the predefined set of traffic that was labelled as legitimate traffic which was observed over a period of time and stored in the form of a rule.
The small, turnkey appliance also interacts with many of the leading firewalls to control traffic to and from vulnerable nodes and/or ports.