When connecting your computer to a network, it becomes vulnerable to attack.
当把您的计算机连接到网络上时,就有了受攻击的可能性。
In the cyberworld, this rule means you couldn't plan a massive computer attack, even on a military network, without regard for the civilian computer networks that would be affected by that attack.
在虚拟空间里,这个规则意味着你不能规划一个庞大的计算机网络攻击,即使是一个军事网络,也不能够排除民用网络受到牵连。
"Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.
“社会工程”的有关计算机或通过向天真的问题,计算机网络用户的信息收集,往往是在计算机网络上进行恶意攻击的第一步。
Network attackers steal other 's private information, attack other people' s computer system and even commit a crime by network.
网络攻击者通过网络窃取别人的个人信息、攻击别人的系统,甚至利用网络攻击进行犯罪。
This algorithm which acts as a security conception of computer and network system is valid and actual and its capacity of detecting attack has very great practical value.
该算法作为一种提供计算机和网络系统安全的概念,其检测攻击的能力是有效和符合实际的,且具有较强的实用价值。
An attack effect evaluation model of computer network based on network entropy was proposed in this paper.
提出了一种基于网络信息熵的计算机网络攻击效果定量评估模型。
It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.
它通过监测计算机网络和计算机系统实现对内部攻击、外部攻击和误操作的实时保护,并对收集的信息进行分析。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
According to scientific connection network reported that recently the U. S. scientists for the first time simulation computer hackers to attack the human brain experiment.
据科学连线网报道,近日美国科学家进行了首次模拟电脑黑客攻击人类大脑的实验。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
Network attackers steal other's private information, attack other people's computer system and even commit a crime by network.
网络攻击者通过网络窃取别人的个人信息、攻击别人的系统,甚至利用网络攻击进行犯罪。
But at the same time, the attack of computer virus is increasing every day on computer and network, and the destructive is becoming more serious.
但与此同时,计算机病毒对计算机及网络的攻击一劳永逸,并且破坏性日趋重大。
The research on attack and defensive of computer network become more and more important.
计算机网络攻击与防范的研究就变得越来越重要了。
With the prevalent of network application, network attack, illegal access and computer virus increase day by day. The problem of network security is more and more serious.
随着网络应用的普及,网络攻击、非法访问和计算机病毒攻击等日益增长,网络安全问题日益严峻。
Information warfare is the major operation mode in modern wars, in which network war take an important part. Distributed and network computer system is the chief target in attack and defense.
信息战是现代战争中重要作战样式,网络战是信息战的重要组成部分,分布式、网络化的计算机系统是信息作战中实施攻击与防护首要作战目标。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
应用推荐