Verizon的数据丢失调查报告显示,几乎一半的数据丢失事件是用户滥用权限访问敏感数据造成的。
Verizon's data breach Investigations Report showed that nearly half of breaches were the result of users abusing their right to access sensitive data.
如果其中任何一位命令者滥用自己的权限--即如果他没有听取被无名氏们称之为"蜂巢意志"的群体聊天意见的话--其他命令者便可将其所在聊天大门之外。
If any OP abuses his power—if he fails to heed what anons call “the hive mind” in IRC conversations— the other OPs can lock him out of the chat.
许多用得很好的UNIX应用程序,包括lpr、xterm和eject,都被滥用,而在程序码的suid栏位中利用缓冲区溢位放弃了root权限。
Many well used UNIX applications, including LPR, xterm and eject, have been abused into giving up root through exploit of buffer overflow in suid regions of the code.
该报告建议信息技术专员应该被授予更多的权限,并对滥用个人数据的行为给予包括监狱服刑在内的更严厉的惩罚。
The report proposes that the Information Commissioner should be given extended powers, and that stiffer penalties, including prison sentences, should be introduced for those who misuse personal data.
在基于角色访问控制的基础上,利用DBMS的审计功能,将用户审计信息与实际的权限管理信息相比较,从而侦测出内部合法用户的滥用行为。
On RBAC, using the audit function of DBMS, by comparing user's audit to the authorization administration information, this System can detect user's misuse behavior to DBMS.
一个主要的原因是传统访问控制模型将进程作为用户的代理赋予其用户的全部权限,从而导致用户权力被滥用。
An important reason is that the classic access control model regards the process as an agent of user and grants it all the user's rights, which results in abusing of the authorized user's rights.
要限制权限滥用,操作系统必须清楚哪些是应用程序正常所需权限。
To prohibit privilege abuse, operating system must clearly know the necessary privileges needed by a program.
国家有义务保障公民在法律限度之内的表达自由,也有权限制表达自由的滥用。
States have the obligation to ensure citizens' freedom of expression within the legal limitations, also has the power to limit the abuse of freedom of expression.
国家有义务保障公民在法律限度之内的表达自由,也有权限制表达自由的滥用。
States have the obligation to ensure citizens' freedom of expression within the legal limitations, also has the power to limit the abuse of freedom of expression.
应用推荐