By placing these components, as appropriate, throughout your network, you can ensure any attack must pass through one or more of these defenses.
在你的网络中适当的安装这些组件,就可以确保任何攻击都必须通过一个或多个这样的防御系统。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
By increasing the number of spoofed packets broadcast or the size of the network broadcast to, you can see that this can be a very serious form of attack.
通过增加欺骗包广播的次数或网络广播的规模,您将发现这能够成为非常严重的攻击形式。
Next, I'll give an example of an old (but still widely used) attack, which involves sniffing passwords right off the network.
接下来,我将给出一个老的(但仍广泛使用的)攻击示例,它就在网下嗅探密码。
The motivation behind this attack is simply to put a network or service temporarily out of business.
这种攻击背后的动机只是使网络或服务暂时瘫痪。
As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.
如前面所述,启用WebSphereApplicationServer安全性使得大多数内部传输都使用ssl来保护其不受各种形式的网络攻击。
Well, just ask Estonia, one of the most internet-dependent countries on the planet, which in 2007 was more or less shut down for two weeks by a sustained attack on its network infrastructure.
嗯,你问一下爱沙尼亚,这个星球上最依赖互联网的国家之一,2007年其网络基础设施受到持续袭击而关闭了多多少少也有两个星期。
A rooftop camera network was set up over Mong Kok, the site of one attack, has failed to catch those responsible.
在袭击发生地之一的旺角已建立起全面屋顶摄像网络,但未抓获袭击嫌疑人。
CCS will monitor network activity and support defense operations in the event of an attack on Air Force networks.
CCS将监测网络活动和支持针对网络攻击事件的防卫行动。
"Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.
“社会工程”的有关计算机或通过向天真的问题,计算机网络用户的信息收集,往往是在计算机网络上进行恶意攻击的第一步。
Meanwhile, these important information network systems face the threat attacked in invasion, and the loophole of operating systems and applications is the foundation of attack implemented by attacker.
与此同时,这些重要的信息网络系统面临入侵攻击的威胁,而操作系统和应用服务程序的漏洞正是攻击者实施攻击的基础。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.
试图破解网络上某一处的安全防护措施,以便在未获得授权的情况下访问系统或者是遭到服务拒绝。
If the attacker sits in the middle of the network, then within the scope of the Internet, this attack becomes impractical.
如果攻击者在网络的中间,在Internet范围内,这种攻击是不可行的。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.
传统的入侵检测方法在面对多变的网络结构时缺乏可扩展性,而且在未知的攻击类型面前也缺乏适应性。
With the popularity of the Internet of things, equipment virtualization, the scale of network attacks will be growing, means of attack will be more and more, the impact will be more serious.
随着物联网、设备虚拟化的普及,网络攻击的规模将会越来越大,攻击手段也会越来越多,造成的影响会越来越严重。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
Aim Provide a literature basis for research strategy of the network attack technology.
目的为网络攻击技术研究策略提供文献依据。
In recent years, with the popularization of the networks, cyber attack and illegal access increased rapidly, it makes the security of network become more grimly.
随着近年来网络的普及,网络攻击和非法访问飞速增长,网络安全的形势日益严峻。
Buffer overrun against the Internet is the most common, also harm the largest kind of network attack means.
缓冲区溢出攻击是互联网上最普通,也是危害最大的一种网络攻击手段。
Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.
“移动代理在入侵检测中的应用”是国家基础研究项目《网络攻防技术》的子课题内容之一。
An investigation into February's attack revealed that the cyberthieves won access to the central bank network because of poor security controls.
对二月份孟加拉国央行失窃事件的调查显示,由于糟糕的安全控制系统,窃贼才得以进入央行网络系统。
This paper expounds the characteristics of network attack, and puts forward corresponding measures.
本文阐述了网络攻击的特点,并提出网络安全的防范措施。
This paper expounds the characteristics of network attack, and puts forward corresponding measures.
本文阐述了网络攻击的特点,并提出网络安全的防范措施。
应用推荐