核攻擊威脅 的英文怎麼說

中文拼音 [gōngwēixié]
核攻擊威脅 英文
nuclear attack threat
  • : 核構詞成分。
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ名詞(從腋下到腰上的部分) the upper part of the side of the human bodyⅡ動詞(脅迫) coerce; force
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全,主要表現在ip網路的開放性,來自外部的增多,如dos / ddos;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  2. At best, therefore, the extra defences can offer a little bit of extra insurance in a crisis, by helping to persuade an aggressor that an attack, or a threatened one in an attempt at nuclear blackmail, might well fail and invite retribution instead

    因此,新的防禦系統能夠充其量使那些挑釁者明白一次進或者訛詐很難得逞,甚至很有可能招致反,這樣能在危難時刻提供些許額外的安全保障。
  3. Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity

    該文首先對國內外拒絕服務以及研究現狀進行分析描述;然後,從拒絕服務的方法分類、主要手段、常見的防禦及防範方法分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務進行有效過濾的方法,並用這種方法在linux內中實現了一個高速過濾器,最後進行了相關的性能測試。
  4. Supporters of the star wars defense system hope that this would not only protect a nation against an actual nuclear attack, but would be enough of a threat to keep a nuclear war from ever happening

    譯文:星球大戰防禦系統的支持者們希望它不僅能保護一個遭受的國家,也希望它能成為使永不發生的足夠
  5. In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management

    筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全路徑分析」和「安全因素分析」方法對該行中間業務的安全進行了詳細的分析,提出了適當的安全需求,採用多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內、防病毒等,設計出了保護中間業務的技術安全防護方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。
分享友人