Identify your security objectives.
确定您的安全性目标。
Identify your security requirements.
确定您的安全性需求。
With Netscape, look at your security icon (looks like a padlock).
用网景浏览器的话,可以查看那个类似挂锁样子的安全图标。
The choice of your security solution depends on the following needs.
安全解决方案的选择依赖于以下需求。
Again, evaluate your security needs and consider the use of stronger ciphers.
再次说明,请评估您的安全需要并考虑使用强度更高的密码。
You should re-export and re-import your security model if you do the following.
如果执行以下操作,则需要重新导出和重新导入安全模型。
But, you need to change configuration defaults to strengthen your security posture.
但是,需要更改默认配置来增强安全性。
You need to select the same database when you import your security model, as shown in Figure 15.
您需要在导入安全模型时选择相同的数据库,如图15所示。
Repeat the steps you followed in this article to export, import, and enforce your security model.
重复本文中导出、导入和实施安全模型的步骤。
In the end, you should choose to use the form of encryption that meets your security requirements.
最后,您应该选择使用符合自身安全需求的加密方式。
You must keep both files in sync in order for the Cube Server to properly enforce your security rules.
您必须保证两个文件同步,以便CubeServer正确实施安全规则。
It also allows you to customize your security via the XML configuration files and the command line.
它还允许通过XML配置文件和命令行定制安全设置。
You now have the three GBeans and the realm set up, and your security roles and constraints are defined.
现在您已经设置了三个GBeans和领域,并且定义了您的安全角色和约束。
The login process, however, uses the Linux username to choose an SELinux user for your security context.
但是,登录进程将使用Linux用户名来为安全上下文选择SELinux用户。
Next, measure the level of business risk associated with your assets according to your security policies.
接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
Just have one list, either an allow list or deny list depending on what your security requirements are.
应该根据自己的安全需求,只使用允许列表或拒绝列表之一。
Family and clan were the way in which people amassed and preserved property - they were your security in life.
家庭和家族成了人们聚敛和维护财富的地方——它们是你生活的保障。
For the Cube Server to enforce your security model when users execute queries, you need to add users to roles.
要使CubeServer在用户执行查询时实施安全模型,需要向角色添加用户。
Note that this is an example; you or your security policy might dictate additional parameters than are being used here.
请注意,这只是一个示例,您或您的安全策略可能规定了其他参数,而不是这里使用的参数。
Be sure to think outside the box and consider any tools that malicious users may employ to penetrate your security.
确保摆脱思维的束缚,并考虑恶意用户可能采用来渗透安全层的任何工具。
You will need to check with your security policies to determine what these values have been set to for your enterprise.
你需要对照你的服务器安全策略来决定该设哪些值。
So I need everybody to be clear - we will protect your identities and your security as you vigorously pursue your missions.
所以说,大家都要清楚一点,那就是,在你们勇敢地执行使命之际,我们一定会保护你们的身份和你们的安全。
After you tell the Cube Server to reload security, it will authorize users according to the policies in your security model.
CubeServer重新加载安全性后,它将根据安全模型中的策略对用户授权。
When you are finished designing your security model, you can export it to a file for import later using the Administration Console.
安全模型设计结束后,您可以将它导出到一个文件,以便稍后使用Administration Console 导入。
Usually, as you identify your security objectives, you'll find that there are some things your program just can't do on its own.
通常,在您确定了安全性目标时,您的程序单靠自己还不能完成某些事情。
I'm just saying that in general, secrecy about how your security system works does not improve security, but rather usually the reverse.
我只是要说,通常情况下对安全系统的运作方式保密并不会提高安全,事实恰恰相反。
In BIS 4.0 the text will be changed and users will now be asked to enter a 'security question and' answer to your security question '.
在BIS 4.0中,文本将被改变,用户将被要求输入一个“隐私问题”和“回答你的隐私问题”。
While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.
尽管多实例化不能防止所有攻击,但它是您的安全工具包的一个有用的补充,而且配置十分简单。
Your role is security, and the only way to get your job done is to really get inside the "enemy"; that is, the person (s) trying to break your security.
您的角色负责安全性,完成您工作的唯一办法就是真正深入敌后,即了解尝试破坏安全性的人员的想法。
Once you have documented your security requirements, then you can start designing profiles to best secure your queue managers and their application messages.
当您确定自己的安全要求之后,就可以开始设计配置文件来最好地保护您的队列管理器及其应用程序消息。
应用推荐