With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
Suppose you host your Web application on a "minority" operating system; you might rely on OpenBSD for its security, for example.
假设您在一个“非主流”操作系统上托管Web应用程序;比如,您可能会依赖OpenBSD来保证安全性。
First is the security of mobile agent system, especially the malicious host problem; Second is the fair exchange problem in electronic commerce.
首先是移动代理系统的安全问题,特别是恶意主机问题;其次是电子商务中的公平交易问题。
The prototype system shows the project reinforces security of host system, and the resource usages is less, and it is applicable in secret network.
该方案对服务器系统安全有所加强,所占用的主机资源和网络资源较少,适用于针对涉密网等高安全级别的可信系统中。
Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.
在恶意主机环境下,主机可以对软件系统进行逆向工程或者肆意的篡改,其安全性、完整性与可用性都受到了很大的威胁。
Caution Enabling all Shared folders can pose a security risk because a Shared folder might enable existing programs inside the virtual machine to access the host file system without your knowledge.
注意:使用所有共享目录会暴露安全风险,因为共享目录可能会使虚拟机中的程序在你不知情的情况下存取主机文件系统。
Therefore, there is a need to work on the comparatively completed FDI utilization system based on host country's industry security.
因此,相对完整、相对系统的基于东道国产业安全的外资利用体系的研究工作是值得进行的。
"Exploitation of this vulnerability allows attackers to break out of an isolated guest system to compromise the underlying host system that controls it," claimed Core Security.
“利用这个弱点,使攻击者以突破的一个孤立的客户系统,以妥协背后的主机系统控制它”,声称为核心的安全。
"Exploitation of this vulnerability allows attackers to break out of an isolated guest system to compromise the underlying host system that controls it," claimed Core Security.
“利用这个弱点,使攻击者以突破的一个孤立的客户系统,以妥协背后的主机系统控制它”,声称为核心的安全。
应用推荐