As this year's crop of internet-security breaches shows, virtual pastures are just as prone to it as the grassy sort.
正如今年的互联网安全漏洞的数量所显示,虚拟牧场和草类牧场一样容易受其影响。
There is the obvious risk of further security breaches.
有明显的风险,进一步的安全违规行为。
Are there clear steps in place for handling security breaches?
是否有清晰的处理安全漏洞的步骤?
Keep in mind that almost 80% of all security breaches come from the inside!
请记住,几乎80 %的所有安全漏洞来自内部!
However, each must be configured properly or serious security breaches are possible.
然而,每一种都必须进行合理的配置,否则可能会出现严重的安全问题。
Popular exchanges were also found 2 more likely to experience security breaches.
受欢迎的交易所中也发现2家更容易出现安全隐患。
Also, letting users specify arbitrary groups using this option can lead to security breaches.
而且让用户使用这种选项指定任意组将破坏安全性。
Enable security auditing and logging for the database you are using so that you are alerted to any security breaches.
为您使用的数据库启用安全审核和记录,以便违反任何安全性时得到警报。
The 2015 statistics below come from the Identity Theft Resource Center, who've been tracking security breaches since 2005.
“身份盗用资源中心”从2005年就开始追踪安全漏洞了,以下是来源于它2015年的数据。
When estimating the damage of a security breach, never forget that security breaches can cause users to lose faith in the system.
在估计安全性被破坏而造成的损失时,不要忘记安全性被破坏会导致系统用户对系统失去信心。
This mode is needed, for instance, by applications that check performance or security breaches on their local network segment.
这个模式是必须的,例如,一些在本地网络上检测性能或者安全漏洞的应用程序。
When estimating the damage of a security breach, never forget that security breaches can cause loss of faith in users of the system.
在估计安全性被破坏而造成的危害时,不要忘记安全性被破坏会导致系统用户对您的系统失去信心。
A number of reports detailing wide-ranging system security breaches have been at the forefront of the news in the past couple of years.
在过去几年中,很多详细谈论大范围的系统安全问题的报道成为新闻的一大热点。
While security officers may not be able to prevent highly sophisticated attacks, they can help protect companies from simple security breaches.
虽说这些负责信息安全的管理人员可能无法阻止技术含量极高的黑客攻击,但起码他们可以避免公司出现低级的安全漏洞。
However, it is just as important to protect the network from internal attacks, especially because most security breaches come from inside.
然而,保护网络不受来自内部的攻击同样重要,主要是由于大多数安全问题来自内部攻击。
To avoid vulnerability to security breaches, an application server that USES these trusted methods should not use un-trusted connection methods.
为了避免对安全漏洞的攻击,使用这些受信任方法的应用服务器不应该使用不受信任的连接方法。
There are many common application-level security issues which can lead to security breaches, including buffer overflows and SQL injection.
有很多应用程序级别的普通保密问题会引起打破保密性,包括缓冲溢出和嵌入SQL。
Medical devices, like other computer systems, are also vulnerable to security breaches, which affect the security and effectiveness of the device.
医疗设备像其它计算机系统一样,同样很容易出现安全漏洞,从而影响到设备的安全性和有效性。
Its software can monitor the use of cloud application by individual employees, and this includes looking for patterns and anomalies that could be security breaches.
它的软件能够监控单个员工对云应用的使用,还能搜索到有可能形成安全泄露的使用模式和异常现象。
Even if dramatic measures are taken, digital payments bring a host of problems of their own-security breaches, privacy concerns and virtual black markets to name a few.
尽管已经采取了大量措施,数字支付系统还是带来了诸多问题——安全漏洞、隐私问题虚拟黑市等等。
The trouble is that most cyber security breaches — including those by nations — exploit known vulnerabilities, such as where a patch was either not developed or deployed.
问题是,多数网络安全侵入——包括国家发动的侵入——利用的是已知的漏洞,比如针对漏洞的补丁尚未开发或应用。
Several thousand customers of Five County credit Union are getting new debit and credit CARDS after security breaches involving an unnamed retailer and processing center.
五州信用联盟被上万名消费者投诉说新申请的借记卡和信用卡存在安全漏洞包括一个匿名的零售商和加工中心。
These attacks are among the hundreds of online security breaches this year alone, compromising data of more than 22 million people, according to the Privacy Rights Clearinghouse.
根据隐私权信息中心的报告说,这些攻击是今年里几百起的在线安全侵入之一,危及2200万用户的数据信息。
Despite all the reports of Internet security breaches over the years, including the recent attacks on Google's E-mail service, many people have reacted to the break-ins with a shrug.
尽管过去几年,经常有报道发现互联网安全漏洞,包括最近对GoogleGmail服务的攻击,但许多人对黑客攻击仍不以为然。
Some are concerned about the privacy implications of having their voice recorded — granted, many businesses already record customer service calls — or they fear security breaches.
一些人担心录制自己声音可能带来隐私问题——的确,很多公司都对客户服务电话进行了录音——或者是,他们害怕安全漏洞。
Although they don't usually give out this information, there are often worrisome leaks and security breaches where they inadvertently release sensitive information about their customers.
虽然他们通常不会透露这种信息,但常常会出现令人担忧的漏洞,他们无意间泄露客户的敏感信息也违反了安全条款。
Security breaches on systems that run intermediaries can result in serious security problems, like loss of secure information and message integrity, which will raise questions of trust.
运行中介体的系统上出现的安全性违规会导致严重的安全性问题,如丢失安全信息和消息完整性,这将引起信任问题。
Security breaches on systems that run intermediaries can result in serious security problems, like loss of secure information and message integrity, which will raise questions of trust.
运行中介体的系统上出现的安全性违规会导致严重的安全性问题,如丢失安全信息和消息完整性,这将引起信任问题。
应用推荐