漏洞評估系統 的英文怎麼說

中文拼音 [lóudòngpíngtǒng]
漏洞評估系統 英文
cvss
  • : Ⅰ動詞1 (從孔或縫中滴下、透出或掉出) leak; drip 2 (泄漏) divulge; disclose; leak 3 (遺漏) le...
  • : Ⅰ名詞(物體上穿通的或凹入較深的部分; 窟窿; 洞穴) hole; cavity Ⅱ形容詞(深遠; 透徹) profound; thorough; clear
  • : Ⅰ動詞1. (評論; 批評) comment; criticize; review 2. (評判) judge; appraise Ⅱ名詞(姓氏) a surname
  • : 估構詞成分。
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 漏洞 : 1. (空隙; 小孔) leak 2. (破綻) flaw; hole; loophole
  • 評估 : estimate; assess; appraise
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和的行為、審計配置和敏感和數據的完整性、識別攻擊行為、對異常行為進行計和審計、自動地收集和相關的補丁、使用誘騙服務器記錄黑客行為等功能,使管理員可以較有效地監視、審計、自己的
  2. Thirdly, the hole scanners at present are in pc and they are n ' t easy to take. at last, the passsingnet hole scanners can n ' t scan through the different net segment. 。 this paper settles the insecurity and incommodity of net scanners in the pc. at the same time, we imploder an embedded operating system independently on the base of linux, discuss the feasibility of embedded net hole scanner and mend shortages of hole scanner at present

    本論文主要是為了解決目前在pc機上的掃描工具的不便利性和不安全性,在linux的基礎上自主開發了一套嵌入式操作,並探討了在嵌入式平臺上實現掃描工具的可行性,並對目前掃描工具的不足加以改進。
  3. In security defense measures, the author advances a dynamic defense system, the core of which is intrusion detection system, namely the linkage with intrusion detection system, vulnerability scanners system and firewalls system

    安全防護措施中提出了以入侵檢測為核心的動態防禦體,即入侵檢測掃描和防火墻的聯動,同時,建立了日常安全維護體和應急響應體及風險機制。
  4. Firstly, it introduces the information security theories and technologies used in the study. the information security theories mainly includes ppdr - the dynamic security model, sse - cmm, padminee - the life cycle of information security engineering model, bs7799 - the standard of information security management, the grade - classification standard of information system security protection, iatf - the technical framework of information security guarantee and the principle of wooden pail etc. and the information security technologies consist of the technology of firewall, invasion detection, virus prevention and cure, loophole scanning, the identity certification and the soc etc. then it studies on the designing of the information security guarantee system

    首先,介紹和分析與本研究相關的主要信息安全理論與技術,其中信息安全理論有ppdr動態安全模型、 sse - cmm安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理標準、信息安全保護等級劃分準則、 iatf信息安全保障技術框架和木桶安全理論等;信息安全技術有防火墻技術、入侵檢測技術、計算機病毒防治技術、掃描與技術、身份認證技術和soc技術等。
  5. One way to protect web services from malicious interruptions is to include information in a web service on vulnerability assessment tools, application security gateways, reporting tools, correlation systems, and remediation tools

    一種保護web服務避免惡意中斷的方法是在web服務中包括關于工具、應用程序安全網關、報表工具、相關以及糾正工具的信息。
  6. It describes the techniques of scanning holes and simulating attacks, which are used to find the vulnerability of the tested system ; it provides one way to evaluate the risk level of the tested system

    對檢測的各種掃描方法和模擬攻擊方法進行了深入的研究,並給出了脆弱性分類方法;對被測的總體安全性等級進行了深入研究和切實有效的探索,並提出了可行的方法。
分享友人