• Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.

    入网访问控制保证网络资源被非法使用, 是网络安全防范保护主要策略

    youdao

  • It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.

    务必考虑系统每个层次可能访问路径同时还要考虑授权如何其他安全功能(网络级别保护)集成

    youdao

  • As a result, the initiative to understand the information network security risks and effective protection, become a positive response.

    因而主动了解信息网络安全隐患加以有效防护成为积极应对之策

    youdao

  • Network Manager meets industry mandated NERC Critical Infrastructure Protection Standards and National Grid cyber security requirements.

    网络管理器符合业界强制的NERC关键基础设施保护标准国家电网网络安全性要求。

    youdao

  • With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.

    访问控制网络安全一个重要组成部分,保障电子政务信息完整性保密性可用性方面发挥着重要作用。

    youdao

  • The invasion detection system is one kind of initiative protection network resources network security system, in recent years, we obtained extensive research and the application.

    入侵检测系统主动保护网络资源的网络安全系统,近年来得到了广泛的研究应用

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • Password protection method was presented to strengthen the network security by analyzing the principle on hacker's detecting password and its common working methods.

    通过黑客软件获取密码原理一般工作方法的分析,提出一种保护密码的方法对于加强网络安全具有一定借鉴意义。

    youdao

  • Based on analyzing various security threats faced by the wireless network, this paper discusses on the principles and methods for constructing the wireless network security protection system.

    分析无线网络所面临各种安全威胁基础讨论构建无线网络安全防护体系原则方法

    youdao

  • The relay protection system is an important part of power network, and has a very close relation with the security and stabilization of the power network.

    继电保护系统电网重要组成部分电网安全稳定运行有着十分密切的关系。

    youdao

  • Intelligent network forensic system (INFS) gives us a new method of network protection, and remedies the shortage of the current network security system.

    智能网络取证为网络防护提供了一种新的措施,弥补原有网络安全体系中的不足

    youdao

  • More detailed analyses are given in these aspects: the campus network plan, topology, the function of the business application system, and security protection and management.

    提出了新校园网建设的需求,从校园网的网络规划拓扑结构业务应用系统功能安全保障安全管理方面进行了详细分析

    youdao

  • This paper discusses the security strategy, system protection, intrusion detection, emergency responding system and backup, disaster restore strategy essential for network security protection.

    文章介绍进行网络安全防范所必需的安全策略系统防护入侵检测应急响应体系备份灾难恢复策略。

    youdao

  • To enhance the sa fe and stable operation of the network, th is paper describes thema jor security threats and protection strategy of Interne.

    加强网络安全稳定运行,特将当前互联网的主要安全威胁防护策略加以分析

    youdao

  • This paper analyzes the traditional security threats, network security threats and database security threats, and advances some corresponding tactics of security protection.

    分析了图书馆传统安全威胁网络安全威胁数据库安全威胁,提出相应安全防范策略

    youdao

  • The multiple protection mechanisms of biological information can be achieved by enhancing reliability and security of palmprint images information in the network transmission.

    增强掌纹图像信息网络传输可靠性安全性可以实现生物信息的多重保护机制

    youdao

  • The main purpose of Access Control, a major technique of network security prevention and protection, is to safeguard network resources from being illegally visited and used.

    访问控制作为网络安全防范保护主要技术主要任务保证网络资源非法访问使用

    youdao

  • The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.

    本文网络安全防范角度讲述了设计实现一个FTP日志分析系统重要性

    youdao

  • Intrusion tolerant technology is the core of the third generation of network security in back of information protection, intrusion detection and fault tolerance technology.

    入侵容忍技术信息保护技术和入侵检测容错技术之后第三网络安全核心

    youdao

  • This paper firstly analyzed the computer network security. It pointed out the main network security protection measures and their shortcomings.

    本文首先计算机网络安全进行了分析指出了网络安全主要防护措施以及不足之处

    youdao

  • The network attack and its protection are a pair of contradictions. Strictly speaking, there is no absolute network security.

    网络攻击防护一对矛盾严格地没有绝对的网络安全

    youdao

  • This paper puts forward the safety problem of network information of our country through a group of data concerning online security, network intellectual property protection, and online crime.

    文章网络安全网络知识产权保护、网络犯罪三角度提出我国网络信息安全存在突出问题

    youdao

  • The modern enterprise network security protection common security issues and their implications, explore ways to solve these problems of network security, provides network-based security policy.

    现代企业网络安全防护常见安全问题及其影响探讨解决这些网络安全问题方法提供了基于网络内部的安全策略

    youdao

  • The model is applied in security evaluation work and the practice result proves that the model and algorithm do a good directive function in network security protection and management.

    实践结果证明,应用该算法模型实施风险评估对被评估单位的网络安全防护和管理工作起到了良好指导作用

    youdao

  • The paper provides the security from the following 3 ways: authentication provided, network protection and endpoint protection.

    接入认证网络各层的防护以及端点保护三个方面软交换提供安全的保障。

    youdao

  • Article 3 the communication network security protection shall follow the principle of "active defense, comprehensive precaution and classified protection".

    第三通信网络安全防护工作坚持积极防御综合防范分级保护原则

    youdao

  • Network forensic system gives us a new method of network protection, and remedies the shortage of the current network security system.

    智能网络取证网络防护提供了一种新的措施,弥补原有网络安全体系中的不足

    youdao

  • It is the identification? The encryption protection of transmission and storage? Integrality and undeniability in information network security that need to use password technology to be solved.

    密码技术解决信息网络安全关键技术,信息网络安全中的身份认证,传输存储信息的加密保护、信息完整性和不可否认性等,都需要运用密码技术来解决。

    youdao

  • IPSEC protocol is a kind of network security standard which is framed by IETF organization for safe communication, and it can be used to provide security protection for IP and higher layer protocols.

    IPSEC协议IETF组织为在IP提供安全通信制定网络安全标准能为IP及其上层协议提供安全保证

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定