• By placing these components, as appropriate, throughout your network, you can ensure any attack must pass through one or more of these defenses.

    网络适当的安装这些组件,就可以确保任何攻击必须通过一个多个这样防御系统

    youdao

  • Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.

    黑客进入虚拟之后,可以使用黑客工具启动恶意网络扫描攻击活动,并把这些活动伪装善意的网络扫描

    youdao

  • By increasing the number of spoofed packets broadcast or the size of the network broadcast to, you can see that this can be a very serious form of attack.

    通过增加欺骗广播次数网络广播规模发现能够成为非常严重攻击形式

    youdao

  • Next, I'll give an example of an old (but still widely used) attack, which involves sniffing passwords right off the network.

    接下来给出一个(广泛使用的)攻击示例在网下嗅探密码

    youdao

  • The motivation behind this attack is simply to put a network or service temporarily out of business.

    这种攻击背后动机只是使网络服务暂时瘫痪。

    youdao

  • As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.

    前面所启用WebSphereApplicationServer安全性使得大多数内部传输使用ssl保护不受各种形式网络攻击

    youdao

  • Well, just ask Estonia, one of the most internet-dependent countries on the planet, which in 2007 was more or less shut down for two weeks by a sustained attack on its network infrastructure.

    问一下爱沙尼亚这个星球依赖互联网国家之一,2007年网络基础设施受到持续袭击关闭多少少也两个星期

    youdao

  • A rooftop camera network was set up over Mong Kok, the site of one attack, has failed to catch those responsible.

    袭击发生地之一旺角建立全面屋顶摄像网络,但抓获袭击嫌疑人。

    youdao

  • CCS will monitor network activity and support defense operations in the event of an attack on Air Force networks.

    CCS监测网络活动支持针对网络攻击事件防卫行动

    youdao

  • "Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.

    社会工程有关计算机通过向天真的问题,计算机网络用户信息收集往往计算机网络进行恶意攻击一步

    youdao

  • Meanwhile, these important information network systems face the threat attacked in invasion, and the loophole of operating systems and applications is the foundation of attack implemented by attacker.

    与此同时这些重要信息网络系统面临入侵攻击威胁操作系统应用服务程序漏洞正是攻击实施攻击基础

    youdao

  • IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    youdao

  • The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

  • For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    youdao

  • Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.

    试图破解网络某一安全防护措施以便在未获得授权情况下访问系统或者是遭到服务拒绝

    youdao

  • If the attacker sits in the middle of the network, then within the scope of the Internet, this attack becomes impractical.

    如果攻击网络中间,在Internet范围这种攻击是不可行的。

    youdao

  • A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    youdao

  • Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.

    传统入侵检测方法面对多变网络结构缺乏扩展性,而且在未知攻击类型面前缺乏适应性

    youdao

  • With the popularity of the Internet of things, equipment virtualization, the scale of network attacks will be growing, means of attack will be more and more, the impact will be more serious.

    随着物联网设备虚拟化普及网络攻击规模越来越大,攻击手段也会越来越多,造成的影响会越来越严重

    youdao

  • To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).

    针对无线传感器网络自身特殊性路由协议面临的攻击类型,提出一个基于理论分布联合的攻击检测模型(GADM)。

    youdao

  • Aim Provide a literature basis for research strategy of the network attack technology.

    目的网络攻击技术研究策略提供文献依据。

    youdao

  • In recent years, with the popularization of the networks, cyber attack and illegal access increased rapidly, it makes the security of network become more grimly.

    随着近年网络普及网络攻击非法访问飞速增长网络安全的形势日益严峻。

    youdao

  • Buffer overrun against the Internet is the most common, also harm the largest kind of network attack means.

    缓冲区溢出攻击互联网普通也是危害最大的一网络攻击手段

    youdao

  • Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.

    移动代理在入侵检测中的应用”国家基础研究项目网络攻防技术子课题内容之一

    youdao

  • An investigation into February's attack revealed that the cyberthieves won access to the central bank network because of poor security controls.

    二月份孟加拉国央行失窃事件的调查显示由于糟糕安全控制系统,窃贼得以进入央行网络系统

    youdao

  • This paper expounds the characteristics of network attack, and puts forward corresponding measures.

    本文阐述网络攻击特点提出网络安全的防范措施。

    youdao

  • This paper expounds the characteristics of network attack, and puts forward corresponding measures.

    本文阐述网络攻击特点提出网络安全的防范措施。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定