The old security model was for it to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle.
IT旧的安全模型是在企业网络周围建立一刻巨大的微尘,只让受信任的、已授权的员工穿越守卫严密的吊桥墙进入众所周知的城堡。
While this protection strategy allows higher network throughput, it does so at the cost of some network security.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
How do you determine the level of security in your office network, even if you have a network administrator manning it?
我们又应该如何来判断办公网络的安全级别呢(尽管您可能有一个网络管理员在管理网络)?
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
The effort is designed to help streamline the Army’s European IT infrastructure and improve network integrity and security, company officials said.
该项工作设计用于帮助实现美国陆军欧洲信息基础设施的无缝化,提高网络一体化和安全性。
Security experts are still trying to work out what its intent is, although they note that it spreads throughout any network to which a Conficker-infected machine is connected.
安全专家仍然在努力发现该病毒的最终意图是什么,虽然他们发现该病毒通过任何中毒电脑所连接的网络传播。
Although DB2 provides a sufficient level of security to safeguard the data over the network, it requires administrators to configure the DB2-specific authentication modules.
虽然DB 2提供了足够级别的安全性来确保数据在网络上的安全,但是仍然需要管理员配置DB 2特有的身份验证模块。
Before delving into SSL itself, it is useful to consider the key security problems that network communication faces, along with the appropriate solutions. Key security problems include.
在深入研究ssl本身之前,考虑一下网络通信面临的关键的安全性问题以及适当的解决方案,这是很有帮助的。
It has also installed robust security software on the devices and ensured that they can gain access only to a hospital's network.
voalte还在他们的智能手机上安装了强大的安全软件,以确保它们只能通过医院的网络连接系统。
The essence of AIXPert is that it is a network and security hardening tool, which incorporates many functions into one system.
AIXPert实质上是一个网络和安全性强化工具,它将很多功能合并到一个系统中。
As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.
如前面所述,启用WebSphereApplicationServer安全性使得大多数内部传输都使用ssl来保护其不受各种形式的网络攻击。
Secure Shell (SSH), as the name suggests, is a tool that provides a high degree of security and reliability to data as it is transferred across the network.
SecureShell (SSH),顾名思义,是一种为网络上传输的数据提供高度安全性和可靠性的工具。
The FBI did not provide details on the security incident, but it looks as though hackers may have used maliciously encoded file attachments to hack into the network.
FBI并没有就此次故障事故提供更多细节,不过看起来黑客们可能是通过带毒的邮件附件对网络进行攻击。
It is essential that organizations design their networks with security in mind and continue to have a strong understanding of their network architecture throughout its lifecycle.
至关重要的是,组织设计的网络安全考虑,并继续在整个生命周期内对他们的网络结构有着深入的理解。
It doesn't, however, report new computers on the network as possible intruders, as Panda Internet Security 2008 does.
然而,它却不把新进入网络的电脑报告为潜在入侵者,熊猫互联网安全2008却报告。
Security is a process, it is a collection of hardware, software, network, personnel and the relationship between them and the interface of the system.
安全是个过程,它是一个汇集了硬件、软件、网络、人员以及他们之间互相关系和接口的系统。
It secures a network against some of the top security issues currently facing system administrators.
它保证了网络对一些顶级的安全问题目前所面临的系统管理员。
IACI has become a reality, then it will bring changes to the field of network security?
IACI已经成为了现实,那么它将给网络安全领域带来怎样的改变呢?
The unique function of IDS makes it play an irreplaceable role in network security system.
IDS独特的作用使它在网络安全体系中占有不可替代的地位。
It users a single_rule base to provide consistent security across the campus network.
它通常以单个规则为基础,为校园计算机网络提供一致的安全保护。
If the home or office Wi-Fi network is used improperly, it can also be thecause of a security breach – again, the passwords at the router must be complexenough, and WPA2 encryption should be set.
如果家里或者办公室的无线网络使用不当,它也可能造成安全问题,再一次强调,路由器的密码必须足够复杂,并且设置成WPA2的加密方式。
It becomes an important research project that how to use the service of the network and reduce the loss in the network information security.
如何尽可能的利用网络的服务,而减少因网络信息安全方面的损失是一个很重要的课题。
Accompanied with the convenience from the network, it still caused the problem of information security.
伴随着网络带来的便利,网络同时为人类带来了信息安全的难题。
Network security is very important in the construction of network, it includes hardware security and software security.
网络安全是网络建设中的重要内容。网络安全包括硬件安全和其上的软件的安全。
It can be said that the network information security is still a big proposition, the purpose and means of network attacks are becoming more diverse.
可以说,网络信息安全依然是一个大命题,网络攻击目的和手段也越来越多样化。
In recent years, with the popularization of the networks, cyber attack and illegal access increased rapidly, it makes the security of network become more grimly.
随着近年来网络的普及,网络攻击和非法访问飞速增长,网络安全的形势日益严峻。
Network is faced with various security threats, and it is important to effectively protect crucial data and to improve the security of computer networks.
通信网络面临多种多样的安全威胁,如何有效地保护重要数据信息、提高通信网络的安全性已经成为一个日益重要的迫切任务。
It gave priority to network security and electromagnetic safety as two major working areas, among others.
尤其是,认为网络安全和电磁安全优先当作二个主要工作范围。
Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.
漏洞扫描技术是一门新兴的技术,它从另一个角度解决网络安全问题。
While it has only three plants used to produce network security equipment, and transfer the other work to other companies.
然而思科仅有三家工厂生产用于互联网维护的设备,而将其他的工作转包给了别的公司。
应用推荐