文章通过对计算机网络入侵方法与手段的分析,提出一些防范措施和侦查取证方法。
Through the analysis of network intrusion methods, this article advances some prevention measures, investigation methods and methods of obtaining evidences.
她的同事崔尼蒂(Trinity)曾经入侵过BBC和苏格兰场的计算机网络:“他甚至曾经短暂控制过在北海巡逻的核潜艇。”
Her colleague Trinity has infiltrated the computers of the BBC and Scotland Yard: “He even managed—for a short time—to take command of a nuclear submarine on patrol in the North Sea.”
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
入侵检测系统(IDS)在计算机网络安全领域起着举足轻重的作用,应用程度比以前有了很大的扩展。
Intrusion Detection System (IDS) plays an important role in the field of computer network security, its degree of application has expanded a lot.
入侵检测技术作为确保计算机网络信息安全的一个重要手段正成为信息安全领域的研究热点之一。
The intrusion detection technique is an important method to insure the computer network security. It is becoming one of hot research topics in information security field.
分析了黑客入侵计算机网络系统的手段,提出并设计出一种新型漏洞检测系统。
By analyzing the means used by hackers to invade computer network systems, a new type of leak detection system is introduced and implemented.
非法入侵一直威胁着计算机网络系统的安全。
Unlawful incursion has been threatening the safety of computer network system.
入侵检测技术作为确保计算机网络信息安全的一个重要手段正成为信息安全领域的研究热点之一。
Intrusion detection technology is one of the hot spots in the information security areas as the important means to insure the computer network information security.
入侵检测是信息安全保护体系中的一个重要组成部分,确保计算机网络资源的安全性。
Intrusion detection is an essential component of information security protection system, which guarantees the security of the network resource.
操作系统的类型信息对于研究针对计算机网络的入侵行为和安全防护措施是非常重要的。
Information of OS types is very important to the research on intrusion behaviors against computer networks.
入侵检测技术是对原有计算机网络安全机制的合理补充,它的应用极大地扩展了网络和系统安全的防御纵深。
Intrusion Detection technology is rational supplement of original computer network security system. The application of it considerably strengthens network and system security.
文章介绍了计算机网络系统IP层安全概况和入侵者对IP层常采用的入侵手段,以及为防止这种入侵所采取的措施。
This paper introduces IP layer security of computer system, incidences often use invading method to IP layer. In order to prevent the invading, should take the measure.
文章介绍了计算机网络系统IP层安全概况和入侵者对IP层常采用的入侵手段,以及为防止这种入侵所采取的措施。
This paper introduces IP layer security of computer system, incidences often use invading method to IP layer. In order to prevent the invading, should take the measure.
应用推荐