Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.
曾有过拒绝服务攻击经历的运营商常说,事件至少会有一些影响,从轻微的服务中断,到持续的破坏和关键故障。
The first step says you need to identify critical system assets-tangible and intangible-that are most likely vulnerable to malicious attacks.
第一步表示您需要识别(有形或无形的)关键系统资产,这些资产罪可能受到恶意攻击。
The first step is to identify critical system assets — intangible or tangible — that are vulnerable to malicious attacks.
第一步是确定易遭到恶意攻击的关键系统资产——无形的或者有形的。
Richard Stieon said, obviously, to do more work, not only to protect the federal agency from cyber attacks, but also to protect the country's critical infrastructure.
理查德·斯蒂农表示,“显然,要做的工作更多,不仅仅是保护联邦机构免于遭受网络攻击,还应保护国家的关键基础设施。
Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.
从思科出版社帮助网络专业人员安全的关键数据和资源的安全题目,防止和减轻网络攻击,并建立端到端的,自防御网络。
A change that introduces some sort of index that allows access to random elements of the large retransmission queue is critical to address the find-first attacks against the TCP stack.
这个改变引入一些索引,允许对大的重传队列中的元素进行随机访问,这个改变对于解决TCP协议栈的find - first攻击问题很重要。
Use tactical reserves at critical points to blunt the massed PACT attacks and defend in depth.
在决胜点使用战术预备队以阻挡巨量的华约攻击并且实施纵深防御。
Inferno heroes know in advance whether their default attacks will be critical hits. Might increases the damage bonus of the critical hits.
地狱英雄会提前知道他们默认的攻击是否为暴击,力量等级会增加暴击的伤害。
Internet-based attacks on critical systems such as gas, power and water have increased around the world, a report suggests.
一份报告显示,世界上针对诸如石化、电力和水力等关键系统的网络攻击正在逐渐增多。
Leading U. S. electricity companies are joining forces to create a new company to stockpile critical pieces of electrical equipment in the event of catastrophe or terrorist attacks.
美国电力大公司合作建立一家新公司,储备关键性电子设备,以备灾难或恐怖袭击的发生。
Researcher Tyler Klinger of Critical Intelligence claims engineers are vulnerable to such attacks.
紧急情报研究员泰勒·克林格声称工程师都是易受攻击的对象。
Insubstantial: Insubstantial creatures take half damage from all attacks except critical hits.
除致命一击外的所有攻击只能对虚体的生物造成一半伤害。
BitDefender detects and blocks attempts to change critical system files or registry entries and warns about attacks performed by code injection (DLL injection).
比特梵德检测并阻止试图改变计算机重要系统文件或注册表的行为,并对代码注入(DLL注入)攻击进行警告。
Key management is an essential technique to secure communication which is critical in the tactical environments where the network infrastructure is vulnerable to various attacks and compromises.
战地网络极易受到各种攻击和破坏,要实现其安全通信,密钥管理是关键技术。
Cyber attacks on national critical infrastructures.
——网络攻击国家关键基础设施。
Cyber attacks on national critical infrastructures.
——网络攻击国家关键基础设施。
应用推荐