訪問拒絕 的英文怎麼說
中文拼音 [fǎngwènjùjué]
訪問拒絕
英文
access refusal- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 拒 : 動詞1. (抵抗; 抵擋) resist; repel 2. (拒絕) refuse; reject
- 絕 : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
- 訪問 : visit; call on; interview; access; addressing; reference to
- 拒絕 : refuse; reject; turn down; decline; in one's refusal to do; give sb. a flat refusal; repel; pass up
-
The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。A value that specifies whether the ace allows access, denies access, causes system audits, or causes system alarms
一個指定ace是允許訪問、拒絕訪問、導致系統審核或是導致系統警告的值。Object, specifies whether the ace allows access, denies access, causes system audits, or causes system alarms. the
對象表示的限定符指定ace是允許訪問、拒絕訪問、導致系統審核或是導致系統警告。Gets a value that specifies whether the ace allows access, denies access, causes system audits, or causes system alarms
獲取一個指定ace是允許訪問、拒絕訪問、導致系統審核或是導致系統警告的值。Automatic certificate enrollment for failed to enroll for one certificate ( )
本地系統的自動證書注冊在注冊一個域控制器證書( 0 80070005 )時失敗。拒絕訪問。Provide a mechanism that offers much finer granular access control than simply denying or granting access - that is, a mechanism that can enforce some before and after actions along with " permit " or " deny " permission
提供一種機制,以比簡單地拒絕訪問或授權訪問更細粒度的控制訪問,也就是說,在「允許」或「拒絕」之前或之後執行某些操作。In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service
本文中的「入侵」 ( intrusion )是個廣義的概念,不僅包括被發起攻擊的人(如惡意的黑客)取得超出合法范圍的系統控制權,也包括收集漏洞信息,造成拒絕訪問( denialofservice )等對計算機系統造成危害的行為。Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example, station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address. " see ieee 802. 1x specifications, page 21, section 7. 9, lines 34 - 39, available to link to in the
在不支持使用安全關聯的共享媒體環境中進行使用eapol的嘗試會導致基於埠的網路訪問控制極易受到攻擊;例如,工作站a只要發出一個使用工作站b的個體mac地址的eapol - logoff包,就能夠在工作站b上掛裝一個成功的拒絕服務攻擊。 」Permission, allow you specify additional restrictions that narrow the access that is granted or denied
權限)允許指定附加限制,這些限制縮小了被授予或拒絕的訪問權限范圍。This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed
具體地說,在同一地點的不同安全區之間採用防火墻、隔離裝置等邊界防護設備進行橫向隔離以抵禦非法訪問、拒絕服務等類型的攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。Object is used to deny access to a secured object
對象來拒絕訪問受保護對象。Denies access to an object, property set, or property
拒絕訪問對象、屬性集或屬性。Role and to all anonymous users
標識)和所有匿名用戶拒絕訪問權限:Once an element specifies that access is allowed or denied, the
元素指定允許或拒絕訪問權后,Object is used to allow or deny access
對象來允許或拒絕訪問。And denied when an expression resolves to
時,拒絕訪問。Attribute denying access to that site, then no code will execute
屬性的策略,拒絕訪問該站點,則不會執行任何代碼。Denies access to the object
拒絕訪問對象。Identifies the trustees that are allowed or denied access to a securable object
標識被允許或拒絕訪問可保護對象的受信者。Since then, armstrong has been largely silent, declining interviews and shunning publicity
自此之後,他大多保持沉默、婉拒訪問,杜絕大眾目光。分享友人