security scan 中文意思是什麼

security scan 解釋
人體掃瞄安檢儀
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • scan : vt ( nn )1 細看,細察;審視。2 〈口語〉大略一閱;瀏覽。3 按韻節念,按句調讀,標出(詩)的格律(...
  1. Equipped with color network print, scan, copy and internet fax as standard functions, the powerful product, bizhub c350 is an all - round plug - n - play document solution with strong network management, document security functions, and high - speed

    Bizhubc350是一個集數碼彩色網路列印、掃描、影印、網際網路傳真於一身的全方位文件處理系統。其主機體已裝備強勁的網路功能、網路管理功能及文件保安功能,實是大小辦公室內文件的最佳集結中樞。
  2. Netradar system is an important research subject in the area of internet security. it ' s aim is to detect the foundational terminals of and the route to a certain aimed intranet ; to scan the softwares that run on the terminals ; to find the services which are provided by the terminals ; to determine the vulnerabilities of the services and the distribution of the vulnerabilities. ater all the above have fmished, the netrada system attacks the vital terminals or the vulnerable terminals and controls them automatically

    網路雷達系統( netradar )是網路安全領域的一個研究課題,該課題的研究目標包括三個方面:探測接入internet的特定目標網路的基礎設施、到達該目標網路的路徑;掃描支撐目標網路運行的軟體實體的類型、提供的服務、探測出其軟體實體的漏洞和脆弱點分佈等信息;根據目標網路的基礎設施構架、拓撲信息、漏洞和脆弱點分佈等信息,有針性對的選取關鍵設備或者防護較弱的設備進行攻擊與控制。
  3. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  4. The microsoft baseline security analyzer mbsa is a tool that enables an individual home user, a corporate user, or an administrator to scan one or more windows - based computers for common security configuration mistakes

    Microsoft baseline security analyzer ( mbsa ) (基準安全分析器)是一個供個人家庭用戶、企業用戶或管理員使用的工具,它能夠在一個或多個基於windows的計算機上掃描常見的安全配置錯誤。
  5. The design of network security scan system

    網路漏洞掃描系統的設計
  6. The final achievement of the research includes the design and the implement of the risk management prototype which is combined with kinds of security technology including security scan, attack source traceback and thread categorizing technology

    本課題的最終成果是實現了風險管理平臺原型,融入了掃描技術、攻擊路徑搜集技術、攻擊分類技術,這些都是實施風險管理的基礎。
  7. Resolution to the security for electrical power plants includes such five parts as equipment of firewall, security scan of network, intrusion detection, anti - virus as well as arrangement of network, detailed demonstration for each part was also discussed

    在電廠信息網路安全解決方案中包括防火墻配置、網路安全掃描、入侵檢測、防病毒和網路管理五個部分,論文對各個部分進行了詳細的論述。
  8. Your operations are constantly threatened by failed security initiatives, information leakage, lack of protection of confidential data and unsecure workflow processes. th fuji xerox docucentre - c4300 c3300 c2200 is powered with multi - tiered, security functions from hard disk overwrite, secure watermark, zero clear to private charge print, giving you greater peace of mind. these security features are integrated into the print, copy, scan and fax processes, making your day - to - day running of operations safe and secure

    富士施樂docucentre - ii c4300 c3300 c2200的多層安全功能集密碼加密硬盤改寫安全水印硬盤清零到個人列印等於一身,讓您可以高枕無憂地處理從列印復印到掃描傳真的各種作業。
  9. Every week i do a full system scan with norton internet security professional

    每個星期我完全與諾頓網路安全掃描系統專業
  10. Firstly, the interrelated knowledge about network security vulnerability is introduced in this thesis, include definition, cause of formation, character and attribute, sort and detecting method. different kinds of skills and characteristics of port - scan technique are analyzed and compared in this thesis. then, the virtues and defects of three kinds of fingerprint technique of os - detect are also analyzed and compared

    本論文首先介紹了網路安全漏洞的相關知識,包括漏洞的定義、成因、特徵和屬性、分類及檢測方法,對各種埠掃描技術及其特點進行了分析和比較,介紹了三種探測操作系統的指紋技術,並分析了它們的優缺點。
  11. Funding is also directed at helping the department of home land security ensure it can meet goals to have all containers screened at overseas ports, and eventually all machines - scan for content at u. s. ports

    資金同時被用於幫助國土安全部門確保其能實現所有目標,即保證所有的集裝箱在海關得以檢驗,並最終使所有機器對貨物的掃描用在美國港口。
  12. In order to improve the defense capability of the online security, making the network safe protection system occupying the initiative position in the face - off of attacking and protecting, besides using the safe tool of passive type ( the fire wall, loophole scan etc. ), the initiative type safe safeguard procedures are needed

    為了提高網路安全防禦能力,使網路安全防護系統在攻擊與防護的對抗中占據主動地位,在網路安全防護系統中,除了使用被動型安全工具(防火墻、漏洞掃描等)外,也需要採用主動型安全防護措施。
  13. Finally, the thesis analyzes address scan, port scan, operate system identify etc. to find what protocol to be used by the attacker in the information collections stage, and designs some program to deceive the attacker. also, in this section the style of honeypot, and the security of honeypot, including two designs about how to abduct the intrusion to the honeypot, the nat ( network address translation ) technique and the proxy technique will be discussed

    在第三部分,分析地址掃描、埠掃描、操作系統識別等信息收集階段的攻擊的原理和所利用的協議,以及所採用的攻擊手段,詳細的論述對地址掃描攻擊的欺騙、對埠掃描攻擊的欺騙、對操作系統識別攻擊對欺騙的設計與實現。
分享友人