深度防御的具体例子有哪些?
通过深度防御来提供更高级别的数据保护。
Offers greater levels of data protection through defense in depth.
您不仅只需要深度防御。
此深度防御模型使用以下示例作为技术基础
This defense-in-depth model begins with technologies as the foundation using the following examples
和任何事情一样,深度防御也是安全性和适用性之间的平衡。
As with anything else, defense in depth is a balance between security and utility.
良好的安全性可提供深度防御;使用多种方法并不一定是坏事。
Good security provides defense in depth; using more than one approach is not necessarily a bad thing.
您将发现,解决这些问题后,可以更轻松地开发多级深度防御。
You will find that resolving the issues makes it much easier to develop multiple defense in depths.
他们能够确定在不引起系统过载的前提下可以开发多少深度防御。
They can determine how many defense in depths can be developed without incurring system overloads.
深度防御背后的理念很简单:永远不要仅依赖于一种安全方法。
The idea behind defense in depth is simple: Never rely on just one security method.
外部攻击者是那些必须透过您的“深度防御”试图闯入您系统的人。
External attackers are those who must traverse your "defense in depth" to try and break into your systems.
深度防御密码保护系统并没有建立,你想马上就建立吗?
A Deep Freeze password has not been set up. Would you like to set the password now?
然后提出一种基于深度防御原则的深度入侵防御系统模型。
本系列文章的第10部分讨论了可以如何使用深度防御来保护您的SOA。
Part 10 of this article series discussed how you can use defense in depth to protect your SOAs.
要提高安全性,明智的做法是使用多种保护方法(也称为“深度防御”)。
To improve security, it's often wise to use more than one method of protection (also called "defense in depth").
很有可能由于组织的全球特性而将深度防御框架作为更小的深度防御组件的协调机构对待。
It is quite possible to treat a defense in depth framework as the orchestrator of the smaller defense in depth players due to the global nature of an organization.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
提出一个基于深度防御思想的内网信息防御系统,阐述系统组成结构和各作用模块的作用。
This paper first proposes one inner-net information defense system based on the depth defense and elaborates in detail the system composition structure and each module function.
为了演示深度防御的工作原理,我们将首先研究包含三个主要层次的中心模型:核心层、中间层和最外层。
To show how the defense in depth works, we will first examine a centric model of three primary layers: core, middle, and outermost.
开发多个深度防御要求事前进行规划,以确定应如何进行设计,以保护多个SOA和避免在高峰期出现过载。
Developing multiple defense in depths requires planning ahead of time to determine how they should be designed to protect multiple SOAs and avoid overloads at peak times.
将性能保持在最优水平的一个方法是开发一个Web服务度量应用程序(请参见图8),以测定深度防御的协调程度。
One way of maintaining performance at an optimal level is to develop a Web service metrics application (see Figure 8) to measure how well the defense in depths are performing in the orchestra.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
我们相信用于认证用户的唯一可行的策略是以深度原则应用防御,混合多种认证技术。
We believe that the only viable strategy for authenticating users is to apply the defense in depth principle, mixing a number of authentication techniques.
虽然某些沿海地区有重兵把守,但这些防御工事似乎没有任何深度,这样看来,德军把海滩当作了自己防御的重点。
Although certain coastal areas are heavily defended, these defences do not seem to be in any great depth, and it would appear that the Germans have concentrated their defence on the beaches.
虽然某些沿海地区有重兵把守,但这些防御工事似乎没有任何深度,这样看来,德军把海滩当作了自己防御的重点。
Although certain coastal areas are heavily defended, these defences do not seem to be in any great depth, and it would appear that the Germans have concentrated their defence on the beaches.
应用推荐