compromised host


Also found in: Dictionary, Thesaurus, Legal, Encyclopedia.
Related to compromised host: phytosis, cephalocaudal axis, malacic

compromised host

a patient with acquired or congenital immunologic deficiency at increased risk for infectious disease complications.

compromised host

a person who is less than normally able to resist infection because of immunosuppressive therapy, immunological defect, severe anemia, or concurrent disease or condition, including human immunodeficiency virus infection, metastatic malignancy, cachexia, or severe malnutrition.

compromised host

A generic term for a host whose immune and other defence systems are less than optimally effective in warding off infection.

Examples
Patients with HIV, cancer, diabetes, or the elderly.

compromised host

A person who lacks resistance to infection due to to a deficiency in any of the host defenses.
See: AIDS; host defense mechanisms; immunocompromised
See also: host
References in periodicals archive ?
The hosts in a trust domain work in collaboration to prevent compromised hosts from joining the trust domain.
Network access control (that is, scan and block) technologies that can quarantine compromised hosts
Return Path found that forty-six percent of email is being sent from hosts that should not be sending email at all - compromised hosts, dynamic IP addresses, and other non-mail servers.
WHO: As Principal Researcher at Damballa, Paul Royal collaborates with researchers and engineers to design new techniques for and apply ongoing research efforts in the implementation of sandboxes, sensors and analyzers used for the discovery and identification of behavior associated with compromised hosts.
As a result, each Failsafe appliance can positively identify compromised hosts with very little chance of a false positive.
While a slight majority of ISPs believe they might actually be in a position to defend themselves against compromised hosts, they believe it will be extremely difficult to do so without first generating new revenue opportunities to fund the effort.
The majority of service providers responding to the survey said that compromised hosts -- commonly referred to as zombies or bots -- are everywhere.
Correlating the signatures with other security events, IBM was able to determine that several attacking sources belonged to educational institutions, revealing that the attacking sources were compromised hosts, belonging to an Rbot network.
Minutes after an attack begins, Profiler can report on compromised hosts, ordered by group, segment or other relevant organizational distinctions.
The second-generation of Trojan horses would listen on specific TCP or UDP ports for packets whose return addresses would be used to contact Controllers, often other compromised hosts.