Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
As a result, the initiative to understand the information network security risks and effective protection, become a positive response.
因而,主动了解信息网络安全隐患并加以有效防护,成为积极的应对之策。
Network Manager meets industry mandated NERC Critical Infrastructure Protection Standards and National Grid cyber security requirements.
“网络管理器”符合业界强制的NERC关键基础设施保护标准和国家电网网络安全性要求。
With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.
随着等级保护的应用和普及,网络安全漏洞扫描需充分考虑执行效率和功能的扩展性问题。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
The invasion detection system is one kind of initiative protection network resources network security system, in recent years, we obtained extensive research and the application.
入侵检测系统是一种主动保护网络资源的网络安全系统,近年来得到了广泛的研究与应用。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
Password protection method was presented to strengthen the network security by analyzing the principle on hacker's detecting password and its common working methods.
通过对黑客软件获取密码的原理及一般工作方法的分析,提出了一种保护密码的方法,对于加强网络安全具有一定的借鉴意义。
Based on analyzing various security threats faced by the wireless network, this paper discusses on the principles and methods for constructing the wireless network security protection system.
在分析无线网络所面临的各种安全威胁的基础上,讨论了构建无线网络安全防护体系的原则和方法。
The relay protection system is an important part of power network, and has a very close relation with the security and stabilization of the power network.
继电保护系统是电网的重要组成部分,与电网的安全稳定运行有着十分密切的关系。
Intelligent network forensic system (INFS) gives us a new method of network protection, and remedies the shortage of the current network security system.
智能网络取证为网络防护提供了一种新的措施,弥补了原有网络安全体系中的不足。
More detailed analyses are given in these aspects: the campus network plan, topology, the function of the business application system, and security protection and management.
提出了新校园网建设的需求,从校园网的网络规划、拓扑结构、业务应用系统功能、安全保障和安全管理等方面进行了详细分析;
This paper discusses the security strategy, system protection, intrusion detection, emergency responding system and backup, disaster restore strategy essential for network security protection.
文章介绍了进行网络安全防范所必需的安全策略、系统防护、入侵检测、应急响应体系及备份、灾难恢复策略。
To enhance the sa fe and stable operation of the network, th is paper describes thema jor security threats and protection strategy of Interne.
为加强网络的安全稳定运行,特将当前互联网的主要安全威胁及防护策略加以分析。
This paper analyzes the traditional security threats, network security threats and database security threats, and advances some corresponding tactics of security protection.
分析了图书馆传统安全威胁、网络安全威胁及数据库安全威胁,并提出了相应的安全防范策略。
The multiple protection mechanisms of biological information can be achieved by enhancing reliability and security of palmprint images information in the network transmission.
增强掌纹图像信息在网络中传输的可靠性和安全性,可以实现对生物信息的多重保护机制。
The main purpose of Access Control, a major technique of network security prevention and protection, is to safeguard network resources from being illegally visited and used.
访问控制作为网络安全防范和保护的主要技术,主要任务是保证网络资源不被非法访问和使用。
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.
本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
Intrusion tolerant technology is the core of the third generation of network security in back of information protection, intrusion detection and fault tolerance technology.
入侵容忍技术是继信息保护技术和入侵检测、容错技术之后的第三代网络安全的核心。
This paper firstly analyzed the computer network security. It pointed out the main network security protection measures and their shortcomings.
本文首先对计算机网络安全进行了分析,指出了网络安全的主要防护措施以及其不足之处。
The network attack and its protection are a pair of contradictions. Strictly speaking, there is no absolute network security.
网络的攻击与防护是一对矛盾,严格地说,没有绝对的网络安全。
This paper puts forward the safety problem of network information of our country through a group of data concerning online security, network intellectual property protection, and online crime.
文章从网络安全、网络知识产权保护、网络犯罪三个角度提出了我国网络信息安全存在的突出问题。
The modern enterprise network security protection common security issues and their implications, explore ways to solve these problems of network security, provides network-based security policy.
现代企业网络安全防护常见的安全问题及其影响,探讨解决这些网络安全问题的方法,提供了基于网络内部的安全策略。
The model is applied in security evaluation work and the practice result proves that the model and algorithm do a good directive function in network security protection and management.
实践结果证明,应用该算法和模型实施的风险评估对被评估单位的网络安全防护和管理工作起到了良好的指导作用。
The paper provides the security from the following 3 ways: authentication provided, network protection and endpoint protection.
从接入认证、网络各层的防护以及端点保护三个方面对软交换提供了安全的保障。
Article 3 the communication network security protection shall follow the principle of "active defense, comprehensive precaution and classified protection".
第三条通信网络安全防护工作坚持积极防御、综合防范、分级保护的原则。
Network forensic system gives us a new method of network protection, and remedies the shortage of the current network security system.
智能网络取证为网络防护提供了一种新的措施,弥补了原有网络安全体系中的不足。
It is the identification? The encryption protection of transmission and storage? Integrality and undeniability in information network security that need to use password technology to be solved.
密码技术是解决信息网络安全的关键技术,信息网络安全中的身份认证,传输和存储信息的加密保护、信息完整性和不可否认性等,都需要运用密码技术来解决。
IPSEC protocol is a kind of network security standard which is framed by IETF organization for safe communication, and it can be used to provide security protection for IP and higher layer protocols.
IPSEC协议是IETF组织为在IP层提供安全通信而制定的网络安全标准,能为IP及其上层协议提供安全保证。
应用推荐