尽管在创建签名时要使用证书的私有部分,但是采用一些工程的方法或类似的技术也可以窃取密码。
While the private portion of the certificate is used to create the signature, the password could also be stolen using social engineering or other similar techniques.
他们还采用各种技术,例如行动授权环节,密码和多保险的指挥控制环节,来减少意外或未经授权发射的可能性。
They also devised technologies—permissive action links, go codes, and redundant command-control links—that minimized the chance of accidental or unauthorized launches.
即使数据不是敏感数据或个人数据,在云中传输和操纵数据时也应该用密码技术加以保护。
Even if the data is not sensitive or personal, it should be secured with cryptography when transported to and from, and manipulated in, the cloud.
应用推荐