This topic provides commonly used terms of Security Center.
Attackers may exploit the privilege escalation vulnerability to obtain the highest permissions and control the website server during attacks. Attackers may exploit this vulnerability to break through the security defense system and threaten assets and data security.
Attackers may run malicious code on servers to attack or control the servers.
The common vulnerability scoring system (CVSS) is used to assess the severity of vulnerabilities.
A distributed denial of service (DDoS) attack is a malicious attempt to attack one or more targets by using multiple compromised computer systems. This type of attack poses great threats to servers.
A web content management system (Web CMS) uses content repositories or databases to store page content, metadata, or other information assets that a system requires.
Vulnerabilities refer to flaws in operating system implementation or security policies. Attackers can exploit vulnerabilities to access the data on your servers or undermine the security of your servers. We recommend that you fix detected vulnerabilities at the earliest opportunity to protect your assets.
Baselines describe the minimum security requirements for system configuration and management. The following items are considered baselines: service and application configurations, configurations for operating system components, permission settings, and system management rules.