The old security model was for it to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle.
IT旧的安全模型是在企业网络周围建立一刻巨大的微尘,只让受信任的、已授权的员工穿越守卫严密的吊桥墙进入众所周知的城堡。
While this protection strategy allows higher network throughput, it does so at the cost of some network security.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
How do you determine the level of security in your office network, even if you have a network administrator manning it?
我们又应该如何来判断办公网络的安全级别呢(尽管您可能有一个网络管理员在管理网络)?
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
The effort is designed to help streamline the Army’s European IT infrastructure and improve network integrity and security, company officials said.
该项工作设计用于帮助实现美国陆军欧洲信息基础设施的无缝化,提高网络一体化和安全性。
Security experts are still trying to work out what its intent is, although they note that it spreads throughout any network to which a Conficker-infected machine is connected.
安全专家仍然在努力发现该病毒的最终意图是什么,虽然他们发现该病毒通过任何中毒电脑所连接的网络传播。
Although DB2 provides a sufficient level of security to safeguard the data over the network, it requires administrators to configure the DB2-specific authentication modules.
虽然DB 2提供了足够级别的安全性来确保数据在网络上的安全,但是仍然需要管理员配置DB 2特有的身份验证模块。
Before delving into SSL itself, it is useful to consider the key security problems that network communication faces, along with the appropriate solutions. Key security problems include.
在深入研究ssl本身之前,考虑一下网络通信面临的关键的安全性问题以及适当的解决方案,这是很有帮助的。
It has also installed robust security software on the devices and ensured that they can gain access only to a hospital's network.
voalte还在他们的智能手机上安装了强大的安全软件,以确保它们只能通过医院的网络连接系统。
The essence of AIXPert is that it is a network and security hardening tool, which incorporates many functions into one system.
AIXPert实质上是一个网络和安全性强化工具,它将很多功能合并到一个系统中。
As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.
如前面所述,启用WebSphereApplicationServer安全性使得大多数内部传输都使用ssl来保护其不受各种形式的网络攻击。
Secure Shell (SSH), as the name suggests, is a tool that provides a high degree of security and reliability to data as it is transferred across the network.
SecureShell (SSH),顾名思义,是一种为网络上传输的数据提供高度安全性和可靠性的工具。
The FBI did not provide details on the security incident, but it looks as though hackers may have used maliciously encoded file attachments to hack into the network.
FBI并没有就此次故障事故提供更多细节,不过看起来黑客们可能是通过带毒的邮件附件对网络进行攻击。
It is essential that organizations design their networks with security in mind and continue to have a strong understanding of their network architecture throughout its lifecycle.
至关重要的是,组织设计的网络安全考虑,并继续在整个生命周期内对他们的网络结构有着深入的理解。
It doesn't, however, report new computers on the network as possible intruders, as Panda Internet Security 2008 does.
然而,它却不把新进入网络的电脑报告为潜在入侵者,熊猫互联网安全2008却报告。
Security is a process, it is a collection of hardware, software, network, personnel and the relationship between them and the interface of the system.
安全是个过程,它是一个汇集了硬件、软件、网络、人员以及他们之间互相关系和接口的系统。
It secures a network against some of the top security issues currently facing system administrators.
它保证了网络对一些顶级的安全问题目前所面临的系统管理员。
IACI has become a reality, then it will bring changes to the field of network security?
IACI已经成为了现实,那么它将给网络安全领域带来怎样的改变呢?
If the home or office Wi-Fi network is used improperly, it can also be thecause of a security breach – again, the passwords at the router must be complexenough, and WPA2 encryption should be set.
如果家里或者办公室的无线网络使用不当,它也可能造成安全问题,再一次强调,路由器的密码必须足够复杂,并且设置成WPA2的加密方式。
It becomes an important research project that how to use the service of the network and reduce the loss in the network information security.
如何尽可能的利用网络的服务,而减少因网络信息安全方面的损失是一个很重要的课题。
Network security is very important in the construction of network, it includes hardware security and software security.
网络安全是网络建设中的重要内容。网络安全包括硬件安全和其上的软件的安全。
It can be said that the network information security is still a big proposition, the purpose and means of network attacks are becoming more diverse.
可以说,网络信息安全依然是一个大命题,网络攻击目的和手段也越来越多样化。
In recent years, with the popularization of the networks, cyber attack and illegal access increased rapidly, it makes the security of network become more grimly.
随着近年来网络的普及,网络攻击和非法访问飞速增长,网络安全的形势日益严峻。
But because of security gateway's logical position, it is potential bottleneck of forwarding efficiency in the process of network communication.
但是由于安全网关在网络通信中所在的逻辑位冒,决定了它本身将是整个通信过程中转发效率方面的一个潜在瓶颈。
Network is faced with various security threats, and it is important to effectively protect crucial data and to improve the security of computer networks.
通信网络面临多种多样的安全威胁,如何有效地保护重要数据信息、提高通信网络的安全性已经成为一个日益重要的迫切任务。
It gave priority to network security and electromagnetic safety as two major working areas, among others.
尤其是,认为网络安全和电磁安全优先当作二个主要工作范围。
It is the advanced network technology in the ERP system, so the information security is important for the ERP system.
ERP系统中运用了先进的网络技术,也正因为如此,ERP系统中信息的安全问题也是ERP系统正确实施而必须解决的问题。
Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.
漏洞扫描技术是一门新兴的技术,它从另一个角度解决网络安全问题。
While it has only three plants used to produce network security equipment, and transfer the other work to other companies.
然而思科仅有三家工厂生产用于互联网维护的设备,而将其他的工作转包给了别的公司。
Information Hiding is a new network security technology, it adopted the confidential information to other hidden vector to transmit this is not easily found by others.
信息隐藏技术是一门新的网络安全技术,它通过把保密信息隐藏到其它载体中来传输,这样不等闲被别人发现。
应用推荐