訪問拒絕 的英文怎麼說

中文拼音 [fǎngwènjué]
訪問拒絕 英文
access refusal
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1. (抵抗; 抵擋) resist; repel 2. (拒絕) refuse; reject
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 拒絕 : refuse; reject; turn down; decline; in one's refusal to do; give sb. a flat refusal; repel; pass up
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. A value that specifies whether the ace allows access, denies access, causes system audits, or causes system alarms

    一個指定ace是允許、導致系統審核或是導致系統警告的值。
  3. Object, specifies whether the ace allows access, denies access, causes system audits, or causes system alarms. the

    對象表示的限定符指定ace是允許、導致系統審核或是導致系統警告。
  4. Gets a value that specifies whether the ace allows access, denies access, causes system audits, or causes system alarms

    獲取一個指定ace是允許、導致系統審核或是導致系統警告的值。
  5. Automatic certificate enrollment for failed to enroll for one certificate ( )

    本地系統的自動證書注冊在注冊一個域控制器證書( 0 80070005 )時失敗。
  6. Provide a mechanism that offers much finer granular access control than simply denying or granting access - that is, a mechanism that can enforce some before and after actions along with " permit " or " deny " permission

    提供一種機制,以比簡單地或授權更細粒度的控制,也就是說,在「允許」或「」之前或之後執行某些操作。
  7. In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service

    本文中的「入侵」 ( intrusion )是個廣義的概念,不僅包括被發起攻擊的人(如惡意的黑客)取得超出合法范圍的系統控制權,也包括收集漏洞信息,造成( denialofservice )等對計算機系統造成危害的行為。
  8. Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example, station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address. " see ieee 802. 1x specifications, page 21, section 7. 9, lines 34 - 39, available to link to in the

    在不支持使用安全關聯的共享媒體環境中進行使用eapol的嘗試會導致基於埠的網路控制極易受到攻擊;例如,工作站a只要發出一個使用工作站b的個體mac地址的eapol - logoff包,就能夠在工作站b上掛裝一個成功的服務攻擊。 」
  9. Permission, allow you specify additional restrictions that narrow the access that is granted or denied

    權限)允許指定附加限制,這些限制縮小了被授予或權限范圍。
  10. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點的不同安全區之間採用防火墻、隔離裝置等邊界防護設備進行橫向隔離以抵禦非法服務等類型的攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。
  11. Object is used to deny access to a secured object

    對象來受保護對象。
  12. Denies access to an object, property set, or property

    對象、屬性集或屬性。
  13. Role and to all anonymous users

    標識)和所有匿名用戶權限:
  14. Once an element specifies that access is allowed or denied, the

    元素指定允許或權后,
  15. Object is used to allow or deny access

    對象來允許或
  16. And denied when an expression resolves to

    時,
  17. Attribute denying access to that site, then no code will execute

    屬性的策略,該站點,則不會執行任何代碼。
  18. Denies access to the object

    對象。
  19. Identifies the trustees that are allowed or denied access to a securable object

    標識被允許或可保護對象的受信者。
  20. Since then, armstrong has been largely silent, declining interviews and shunning publicity

    自此之後,他大多保持沉默、婉,杜大眾目光。
分享友人