While this protection strategy allows higher network throughput, it does so at the cost of some network security.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
Develop and document a robust information security architecture as part of a process to establish an effective protection strategy.
制定和文件作为一个进程的一部分,健全信息安全架构,以建立一个有效的保护战略。
Documenting the information security architecture and its components is critical to understanding the overall protection strategy, and identifying single points of failure.
记录的信息安全体系结构及其组成部分的认识是至关重要的整体保护战略,并确定了单点故障。
Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
The design principle, system design and security strategy of integrative information security and protection architecture are discussed.
以及一体化信息安全防护体系的设计原则、系数设计、管理上的安全策略。
To enhance the sa fe and stable operation of the network, th is paper describes thema jor security threats and protection strategy of Interne.
为加强网络的安全稳定运行,特将当前互联网的主要安全威胁及防护策略加以分析。
This paper discusses the security strategy, system protection, intrusion detection, emergency responding system and backup, disaster restore strategy essential for network security protection.
文章介绍了进行网络安全防范所必需的安全策略、系统防护、入侵检测、应急响应体系及备份、灾难恢复策略。
Expert system, protection system and detection system respectively confirms security level and strategy in alternation, and detects new attack event.
专家系统、防御系统和检测系统交互分别确定安全级别和安全策略,并检测新的攻击。
Expert system, protection system and detection system respectively confirms security level and strategy in alternation, and detects new attack event.
专家系统、防御系统和检测系统交互分别确定安全级别和安全策略,并检测新的攻击。
应用推荐