Determine the potential for damage from a successful attack that results in a security breach.
确定攻击成功而导致安全性被破坏的可能性。
Before implementing your SOA to the outside world, decide how you will handle a security breach.
在对外部世界实现soa之前,应该决定您将如何处理安全漏洞。
Although you can take steps to decrease the risk of a security breach, your data is still in some danger.
虽然您可以分步来减少安全破坏的风险,但您的数据还是处于某种危险之中。
Keep in mind that if you ever see this message again, that is quite possibly a sign of a security breach.
请记住,如果您再次看到这个消息,则很可能表明安全性已被破坏。
Rumours about a security breach at Kaspersky resulting in source code being leaked have been going around since 2009.
关于在卡巴斯基安全造成破坏的源代码被泄露的传言,2009年以来一直在进行左右。
While this bypasses the previous limitation, it introduces a security breach in case you want to build segregated networks.
虽然这个方法不会出现前面的限制问题,但是如果您希望创建分隔的网络,那么它会造成一个安全漏洞。
By creating multiple lines of defense around your database, you can minimize the damage inflicted by a security breach.
借由在资料库周围筑起多道防线,您可以将安全性破坏所造成的损伤减至最少。
When estimating the damage of a security breach, never forget that security breaches can cause users to lose faith in the system.
在估计安全性被破坏而造成的损失时,不要忘记安全性被破坏会导致系统用户对系统失去信心。
When estimating the damage of a security breach, never forget that security breaches can cause loss of faith in users of the system.
在估计安全性被破坏而造成的危害时,不要忘记安全性被破坏会导致系统用户对您的系统失去信心。
Last week, Facebook scrambled to fix a security breach that allowed users to see their friends' supposedly private information, including personal chats.
上周Facebook紧急修复了其安全漏洞,该漏洞允许用户浏览好友的隐私信息,包括私人聊天记录。
Often the stakeholders would like to spend more on functionality than security and then if there is a security breach then the developer is seldom punished.
利益干系人更愿意在功能上花费更多,而不是安全性;如果出现了安全漏洞,开发人员也很少被惩罚。
A security breach may result when the indication of the authenticity of the message's originator needs to be translated from one secure transport protocol to another.
当需要将消息的初始发送者的关于可靠性的指示从一种安全传输协议翻译到另一种安全性传输协议时,可能会发生安全性违规。
Their fears are justified: a recent survey showed that about a third of those polled would quit doing business with a company they perceived to be guilty of a data security breach.
他们的恐惧变成了现实:最近的一项调查显示,大约 1/3的受调查者在与他们认为存在数据安全隐患的公司进行交易。
But, she said, since the EgyptAir plane had stops in Tunisia and Cairo, a security breach in one of those destinations could have led to an explosive device being loaded onto the plane.
但她表示,鉴于埃及航空那架飞机在突尼斯和开罗都降落过,这些目的地中任何一个地方的安全漏洞都可能导致爆炸装置被送上飞机。
Increased Storage Protection with file Vault: you can securely store personal information or sensitive files on your computer, making them invulnerable to theft or to a security breach.
增加存储保护与档案跳马:您可以安全地储存个人信息或敏感您电脑上的档案,使他们免受盗窃或一个安全缺口。
A pioneering law in California in 2003 required companies to notify people if a security breach had compromised their personal information, which pushed companies to invest more in prevention.
2003年加利福尼亚州初创的法律要求,当商业公司的信息安全漏洞危及人们的个人信息安全时则公司必须通知相关人员,这条法律迫使商业公司增加了对信息安全防范的投入。
If the home or office Wi-Fi network is used improperly, it can also be thecause of a security breach – again, the passwords at the router must be complexenough, and WPA2 encryption should be set.
如果家里或者办公室的无线网络使用不当,它也可能造成安全问题,再一次强调,路由器的密码必须足够复杂,并且设置成WPA2的加密方式。
But in a series of messages on Twitter, the group suggested that it had no choice but to publish the archive because copies of the document were already circulating online following a security breach.
但是这个团体微博上的一系列信息表示他们不得已才公布这些文件的,因为这些文件的副本已经带着安全漏洞在网络上流传。
Barely a day passes without news of another major computer security breach.
一天中,很少有能出现信息安全不被破坏的消息。
Pick up a newspaper on any given day, and you're likely to read about some sort of online security breach.
拿起任何一天的报纸,您都可能会看到关于网络安全破坏事件的报道。
Develop policies and procedures that tell you what to do before, during and after a breach of data security.
制定公司政策及过程,以告诉您平时应该做什么,发现数据安全问题时又应该做什么。
When the operations group inadvertently deploys a version of software that has not been properly tested or reviewed, the business may suffer from a resulting service outage or security breach.
当操作组无意识的应用软件的版本,没有得到合适的测试或者检查时,商业机构就会遭受服务商或者安全部门的严重损失。
At a minimum, security breach response plans should include a list of contacts, an initial response team, and basic instructions.
至少,安全漏洞响应计划应该包括联系人列表、初始响应团队和基本指示。
The security breach was a major setback to the CIA, which has been expanding its presence in Afghanistan.
对于正在扩大在阿富汗的存在的中情局来说,这次暴露了安全隐患的事件是一个巨大的后退。
The security breach was a major setback to the CIA, which has been expanding its presence in Afghanistan.
对于正在扩大在阿富汗的存在的中情局来说,这次暴露了安全隐患的事件是一个巨大的后退。
应用推荐