有没有针对外部攻击备用的程序?
Are there documented procedures for responding to external threats (bombs, robberies)?
第一种方案涉及一种很常见的外部攻击形式,称为网站涂改。
The first scenario involves a fairly common form of external attack known as Web site defacing.
当多数人考虑安全威胁时,他们考虑防御外部攻击。
When most people think of security threats, they think of defending themselves from external attacks.
同时也讨论了新体制抵抗外部攻击和内部攻击的安全性。
It also discusses the security of the new scheme against outsider attack and insider attack.
请记住,内部应用程序总是可以利用外部攻击方法进行攻击。
Keep in mind that internal applications can always take advantage of external methods of attack as well.
许多人从保护专有网络不受外部攻击的角度来看待网络的安全。
Many people think of network security from the perspective of protecting the private network from outside attacks.
外部攻击者是那些必须透过您的“深度防御”试图闯入您系统的人。
External attackers are those who must traverse your "defense in depth" to try and break into your systems.
但是人们的注意力只集中在外部攻击的防范,内部网络安全却被忽视了。
However, people's attention is only focused on preventing external attacks, internal security is neglected.
通过这种方式,CEH可以获取外部攻击者在尝试渗透环境之前需要了解的实际场景。
In this way, the CEH gets a real-world scenario of what an outside hacker would need to discover before attempting to infiltrate the environment.
安全分析表明它能抵抗各种内部和外部攻击,是一种安全的多重签名方案。
The security analysis of the new scheme shows that it can resist all kind of outsider and insider attacks.
比这更糟糕的是,这样的系统很多都没有经过优化,容易受到部分或全面故障和外部攻击的威胁。
Worse than this, many such systems are not optimized and are vulnerable to the threats of partial or complete failure and external attacks.
我们来为这套装备加点风险,她的被动技可缩短外部攻击的距离,最大化她的伤害输出。
To add risk to the kit, her passive encourages her shorter-range auto-attacks to maximize her damage output.
入侵检测作为一种主动的安全防护技术。提供对内部攻击、外部攻击和误操作的实时保护。
As an active intrusion detection security protection technology, intrusion detection provides internal attacks and external attacks and misuse of the real-time protection.
对于防范服务破坏,用户可以从防止外部攻击、防止内部攻击以及防止中继攻击三方面考虑。
To be on guard the service is destroyed, the user is OK from prevent exterior attack, prevent interior attack and prevent to relay attack tripartite face considers.
这类限制可以让应用程序在私人LAN上执行,简便又稳当地强化应用程序对外部攻击的抵御。
Such restrictions enable an application running on a private LAN to simply and robustly harden itself against external attacks.
男孩在外部攻击行为与消极提名、社会喜好、社会影响、同伴评定之间的相关均显著地高于女孩。
The correlation between overt aggressive behavior and negative nomination, social preference, social impact, peer rating of boys is higher than that of girls.
我将首先描述两种涉及内部攻击的方案(即,在组织内部发起的攻击),然后研究涉及外部攻击的两种方案。
I'll first describe a couple of scenarios involving internal attacks (that is, attacks that originate within an organization), and then take a look at a couple of scenarios involving external attacks.
它通过监测计算机网络和计算机系统实现对内部攻击、外部攻击和误操作的实时保护,并对收集的信息进行分析。
It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.
研究表明,在男女初中生中,不论外部攻击还是关系攻击,一对友伴表现出的攻击行为越多,其同伴接纳程度越低。
The results showed that regardless of gender and type of aggression, the more aggressive a child appeared, the lower the child's social acceptability with peers.
虽然这个恐怖组织建立了一个庞大的、秘密的外部行动部门,致力于攻击西方,但它也形成了一种支持和鼓励个人发动袭击的后备战略。
While the terror group established a large, secretive external operations wing bent on attacking the West, it has also cultivated a backup strategy of enabling and inspiring attacks by individuals.
如果攻击者可以在这些参数中嵌入恶意的命令,那么外部系统就可能以应用程序的名义执行这些命令。
If an attacker can embed malicious commands in these parameters, the external system may execute those commands on behalf of the... application.
现在,攻击者(外部或内部)仅需入侵一个系统就可以访问所有主数据。
Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.
例如,外部使用者可以利用的网路伺服器程序中的缓冲区溢位,可能使攻击者登入到机器。
For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.
外部力量发动的系统攻击。
这些防御措施有效地阻止了基于解析器创建外部网络连接的所有攻击。
These defenses effectively stop any attacks based on the parser making external network connections.
您还了解了密码破解者如何在内部和外部使用技术攻击您的基础结构。
You also saw how password crackers use techniques both internally and externally to your infrastructure.
接下来,感染病毒的电脑被连起来形成“僵尸网络”,并被外部控制。“僵尸网络”能被用来发送垃圾邮件或者发动能使网站瘫痪的洪水攻击。
Compromised machines can then be linked up to form "botnets" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.
此外,日志框架本身无法保证日志输出避免外部的服务攻击。
In addition, the logging framework does not attempt to protect itself against denial of service attacks.
WAF系统的部署,可以为web应用增加一个外部安全层来检测或防止攻击。
WAFs are deployed to establish an increased external security layer to detect and/or prevent attacks before they reach web applications.
WAF系统的部署,可以为web应用增加一个外部安全层来检测或防止攻击。
WAFs are deployed to establish an increased external security layer to detect and/or prevent attacks before they reach web applications.
应用推荐