leak information 中文意思是什麼

leak information 解釋
透露風聲
  • leak : n. 1. 漏洞,漏罅,裂縫。2. 漏;漏水,漏氣,漏出,滲漏;泄漏。3. 漏出物;【電學】漏電,漏泄電阻。4. 〈俚語〉撒尿。vi. ,vt. 1. (使)漏,(使)滲。2. (使)漏出,使泄漏。
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Used properly - with a key of sufficient length and an encryption mode that doesn t leak information about the plaintext - most modern algorithms are reasonably safe against cryptanalytic attacks

    如果使用得當使用足夠長的密鑰和不會泄漏關于明文的信息的加密方式大多數現代演算法在密碼分析攻擊面向都有一定的安全性。
  3. This is especially important in a hosting scenario where a custom site - map provider, if not implemented correctly, could leak information or contain default configuration settings that are not secure

    在宿主方案中,這一點尤其重要,因為如果沒有正確實現,自定義站點地圖提供程序可能會泄露某些信息,或包含不安全的默認配置設置。
  4. When performed the cryptographic computation, the smart card will leak information, namely timing of operations, power consumptions, electromagnetic emissions, etc. power analysis attacks use this information to break the secret key

    晶元在執行加密運算時硬體本身會泄露一些信息,如能量消耗、電磁輻射等。能量分析攻擊利用此信息進行分析,便可獲得和密碼相關的一些有用信息。
  5. In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service

    本文中的「入侵」 ( intrusion )是個廣義的概念,不僅包括被發起攻擊的人(如惡意的黑客)取得超出合法范圍的系統控制權,也包括收集漏洞信息,造成拒絕訪問( denialofservice )等對計算機系統造成危害的行為。
  6. The leak of information was officially inspired

    這一情報的泄漏是官方授意的。
  7. Novak has not said where he got the information, but denied it was a " planned leak, " and said he was never told revealing plame ' s identity would endanger her or anyone else

    諾瓦克並沒有透露他的消息來源,但他拒絕承認這是一起「有預謀的泄密事件」 ,並稱他從未被告知泄露普拉姆的身份會危及她或其他人的安全。
  8. In order to effectively prevent system leak loss and boost revenue supply, twd established a leak improvement task force, on jan. 21, 2003, to extensively collect information and experience from other countries to establish a mid - and long - term network improvement plan, under guidance of the four major axes in leakage management

    為有效防止系統漏損提升售水率,本處於92年1月21日成立漏水改善小組,廣泛?集各國經驗,並參考漏水管理四大主軸,擬訂中長程管網改善計畫。
  9. Perino says the bush administration is concerned about the leak both because it may make gaining future intelligence more difficult and because it may discourage private citizens from sharing information with the government if they do not believe that information will be protected

    白宮發言人佩里諾表示,布希政府非常關注此次情報泄漏事件,不僅因為這件事使以後獲得情報變得更加困難,同時可能使那些想向政府提供情報的普通公民感到失望,他們不再相信政府能夠保護好信息。
  10. Phelan found out that the source of the leak in the hughes organisation had been gregson bautzer. he gave dietrich this titbit of information, and dietrich the roof

    費倫發現是格雷格森?鮑澤泄露了休斯公司的機密。於是他把這一重要的情報給了迪特里希,迪特里希知道后極為生氣。
  11. Because of the merit of continuity, economical efficiency, reliability and high resolution, the well logging has shown its advantages, especially in some drilling engineering problem, such as the prediction of rock drillability, selecting the drill bit types, prediction of formation pressure, calculation the in - situ stress, evaluating the borehole walls stability and determining the reasonable mud density, and etc. aiming at the engineering accidents, for example the well spout, well leak, well collapse and the drill blocking during the drill engineering in the t formation in north - east of sichuan, some farther studies of formation pressure in feixianguan from well - logging information are presented in this dissertation

    尤其是在巖石可鉆性預測與鉆頭選型、地層壓力預報、地應力計算以及井壁穩定性評價、泥漿密度安全窗確定等鉆井工程問題上。測井技術由於連續性、經濟性、可靠性及解析度高等特點,越來越多地顯示了其優越性。本文針對川東北部三疊系地層在鉆井過程中遇到的井噴、井漏、井塌和卡鉆等工程事故,主要對飛仙關組地層壓力的測井解釋方法作了大量的深入研究工作。
  12. Because of lacking of necessary management measures, private broadband lans are vulnerable both by the outer networks and the inner nodes, which result in the leak of important information

    由於缺乏必要的監管措施,專用寬帶網在受到外部網路的惡意攻擊的同時,來自內部的攻擊也逐漸增多,導致內部重要信息的泄漏。
  13. Information about the web server ' s host machine might leak through, giving outsiders access to data that can potentially allow them to break into the host

    通過為外人提供的數據可以潛在地為他們提供進入服務器主機的捷徑,這就可以導致服務器主機的信息被竊取。
  14. And even if the ca file has a password, this information could leak out as your administrators leave and move on to other companies

    雖然ca文件有口令,但是口令也可能在您的管理員離開或者跳槽到其他公司時而泄露出去。
分享友人