Finally, the solution of access control in host-network security is given.
最后对主机网络安全的访问控制给出了实现方案。
In this paper, architecture of host-network security is presented, and then some key technologies of host-network security is discussed.
文章提出了主机网络安全体系结构,并对其中的关键技术作了探讨。
Outside the host network (Intranet or extranet) are considered not to be trusted, so the application can run on the host and external services to set targeted strong security policy.
该主机以外的网络(内部网或外部网)都认为是不可信任的,因此可以针对该主机上运行的具体应用和对外提供的服务来设定针对性很强的安全策略。
The prototype system shows the project reinforces security of host system, and the resource usages is less, and it is applicable in secret network.
该方案对服务器系统安全有所加强,所占用的主机资源和网络资源较少,适用于针对涉密网等高安全级别的可信系统中。
Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed.
然后深入研究了基于网络的安全扫描与基于主机的安全扫描两种技术,并分析了两种技术的对比,对两种技术中流行的安全扫描工具进行了研究。
In the field of network security, the secure performance analysis assessment based host is becoming highlighting.
在计算机网络安全领域,针对目标主机的安全性能分析评估是当前的研究热点。
The security of Internet information include two components: security of host computor and security of network.
网络信息安全包括主机安全和网络安全两部分。
From the Angle of enterprise network, it includes security of connection, security of the network equipments and security of internal host computer.
从企业网角度上还可以分为,接入点安全、网络设备安全和内部主机安全。
Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.
在分析影响服务可用性网络攻击导致网络流量异常改变的基础上,提出了一种主机网络实时流量的安全状况评估方法。
Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.
在分析影响服务可用性网络攻击导致网络流量异常改变的基础上,提出了一种主机网络实时流量的安全状况评估方法。
应用推荐