务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
SecureShell (SSH)的目的在于在通过网络远程访问另一个主机时提供最大的保护。
Secure Shell (SSH) was intended and designed to afford the greatest protection when remotely accessing another host over the network.
Sawers夫人没有给她的Facebook账号设置隐私保护,Facebook上的所有通过伦敦公用网络接入的用户都可以访问她的页面。
Lady Sawers put no privacy protection on her Facebook account, allowing any of the site's users in the open-access London network to see the entries.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Information gathered by social network applications needs to be protected by policies which control access to information.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
安全管理保护网络用户资源与设备以及网络管理系统本身不被未经授权的用户访问。
Security management protects network user resources and devices and the network management system itself is not accessed by unauthorized users.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
The article emphasizes on discussing the two measures to protect the datum in the network: accessing control measure and information encryption measure.
这种分散化的解决方法将会降低网络带宽需求,提供更快的访问,同时保护学术研究资料免遭意外损失。
This decentralized solution will reduce network bandwidth needs and provide faster access, all the while protecting the scholarly record against accidental loss.
为了实现对本体的有效保护,提出了一种基于网络本体语言的访问控制模型。
To guarantee the effective protection of the ontology, a new web ontology language-based (OWL-based) model for access control is proposed.
访问控制列表能够过滤掉网络中的有害报文,给网络提供一层相对安全的保护。
Access control list can be used to filter away dangerous packets and give some level of protection to the network.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
同时半可信代码可以访问网络以及文件系统,访问注册表,以及其他系统保护的资源。
Meanwhile, partially trusted code can be barred from general access to the network and file systems, access to the registry, and other protected resources of the system.
访问控制作为网络安全防范和保护的主要技术,主要任务是保证网络资源不被非法访问和使用。
The main purpose of Access Control, a major technique of network security prevention and protection, is to safeguard network resources from being illegally visited and used.
这些由软硬件构成的网守系统通过阻止未经认证的访问、限制授权访问的访问权限,保护计算机网络。
These are gatekeepers made of hardware and software that protect a computer network by shutting out unauthorized people and letting other authorized go only to the areas they have privileges to use.
当移动用户或远程用户访问公司网络时,他们可能从未经保护的公网上不经意地引入病毒和蠕虫。
As they access the corporate network, mobile and remote users inadvertently can infect the network with (75) and worms acquired from unprotected public networks.
当移动用户或远程用户访问公司网络时,他们可能从未经保护的公网上不经意地引入病毒和蠕虫。
As they access the corporate network, mobile and remote users inadvertently can infect the network with (75) and worms acquired from unprotected public networks.
应用推荐