Current information security defense for security issues of the storage appeared polarization.
当前针对存储安全问题的信息安全防御出现了两极分化。
Negative defense will only lead to be attacked and only depending on sealing off the existed system leaks can't solve information security problems.
消极防御只能被动挨打,单纯依靠封堵现有的系统漏洞不能从根本上解决信息安全问题。
The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.
信息安全的核心技术在于“攻防”,即攻击技术和防御技术,只有掌握攻击技术才能更好做到安全防御。
This thesis researches two technology measures of appling information assurance, they are Defense-in-Depth and Security Health Care.
本文研究了实施信息保障两项技术措施:纵深防御和安全保健。
Information security not only requires a guarantee on technology and law, but also needs a line of moral defense.
信息安全不仅需要技术、法律层面的保障,而且需要构筑必要的道德防线。
The first defense for the security of information on the network is ID authentication. A practical method of ID authentication is put forward to conquer the abuse of normal remote login mechanism.
网络信息安全的第一道防线是身份认证,文章基于一般远程登录机制的弊端,提出了一种实用的身份认证方法。
The first defense for the security of information on the network is ID authentication. A practical method of ID authentication is put forward to conquer the abuse of normal remote login mechanism.
网络信息安全的第一道防线是身份认证,文章基于一般远程登录机制的弊端,提出了一种实用的身份认证方法。
应用推荐