• IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    youdao

  • For example, as in a CSRF vulnerability in Google Mail. In this proof-of-concept attack, the victim would have been lured to a web site controlled by the attacker.

    例如GoogleMailCSRF漏洞这个概念验证的攻击中,受害者引诱一个攻击控制站点

    youdao

  • But problems resurfaced this month with Google writing in its official blog about hackers exploiting a vulnerability in Internet Explorer to attack some Gmail users.

    但是这个问题有重新出现google自己官方博客里黑客利用网络浏览器弱点伤害gmail用户

    youdao

  • Now that we know the basis of an attack, what can we do to protect ourselves from this vulnerability?

    既然我们知道攻击基本知识那么做些什么才能保护我们自己避免一脆弱性呢?

    youdao

  • Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.

    最后是三个漏洞个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞最后利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。

    youdao

  • This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.

    本文首先研究智能决策支持系统体系结构集成方式知识库设计然后系统漏洞网络攻击模式进行了深入探讨

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.

    攻击分类研究对于系统分析计算机系统脆弱性攻击利用技术方法有着重要的意义,这有助于构造高效入侵检测方法。

    youdao

  • This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    详细分析了UMTS认证密钥分配协议过程以及协议的安全性,找出协议中存在弱点可能攻击,提出了公钥加密协议的改进方法。

    youdao

  • The paper begins with an analysis in vulnerability risk evaluation, including its theory, attack graph and specialty of vulnerability.

    论文漏洞评估原理攻击路径漏洞本身,提出种基于攻击路径的漏洞风险评估模型。

    youdao

  • This article further investigates system vulnerability and network attack patterns, designs and implements a network attack intelligent decision support systems (NAIDSS).

    本文在深入研究系统漏洞网络攻击模式的基础上,提出实现了一种面向网络攻击的智能决策支持系统

    youdao

  • Practice with today's idea will help you to understand that vulnerability or invulnerability is the result of your own thoughts. Nothing except your thoughts can attack you.

    今天练习有助于了解,不论脆弱或是不侵的,都在于你自己的一之间。

    youdao

  • It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.

    通过构造一个有明显安全漏洞系统来引诱入侵者进行攻击捕获入侵者攻击过程中在蜜罐系统活动数据

    youdao

  • OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.

    OS扫描黑客进行OS漏洞攻击前奏实时检测OS扫描是防止系统遭受OS漏洞攻击重要手段

    youdao

  • A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability.

    完整攻击过程通常会包括一系列单独的攻击行为每个攻击行为某个系统漏洞(脆弱性)的一次利用

    youdao

  • Using a vulnerability index and reviewing risks from deliberate and random attack the effectiveness of the sorting methods is then evaluated.

    则节点移除后网络破坏程度可以最大连通子图的相对大小,全局效率以及脆弱性指标进行评价。

    youdao

  • A human who exploits a vulnerability perpetrates an attack on the system.

    可利用脆弱性系统进行罪恶的攻击

    youdao

  • You get to know about the vulnerability before others do, so you get a patch before anybody else finds and attack you.

    知道面前脆弱性别人所以得到一个补丁之前别人发现攻击你。

    youdao

  • The low income crowd's characteristic had decided they facing the risk vulnerability, some small attack have the possibility to make lose anything, therefore they need the risk the transfer method.

    低收入人群特性决定他们面对风险脆弱性一些微小打击都有可能造成倾家荡产所以他们更需要转移风险方法

    youdao

  • In this paper, we focus on the vulnerability that the administrator account and password are empty, using some basic methods of attack, describing in detail the process of attacks.

    利用漏洞对系统进行攻击成为了黑客们惯用本文针对管理员账号口令一安全漏洞,采用了一些基本攻击方法,详细描述了具体地攻击过程。

    youdao

  • Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.

    脆弱性复杂网络系统固有本性,是网络攻防焦点

    youdao

  • Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.

    脆弱性复杂网络系统固有本性,是网络攻防焦点

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定