數據包隱私 的英文怎麼說

中文拼音 [shǔbāoyǐn]
數據包隱私 英文
packet privacy
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • 數據 : data; record; information
  • 隱私 : 1. (隱蔽不外露) conceal; hide2. (秘密事) secret; one's secrets; private matters one wants to hide
  1. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸日益增加,其中含了各種機密信息(例如軍事機密信息、商業機密信息、個人信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. These companies may use information not including your name, address, email address or telephone number about your visits to this and other web sites in order to provide advertisements on this site and other sites about goods and services that may be of interest to you

    並且這些公司僅收集英文用戶的信息,行為興趣愛好,並可能向您提供一些您可能會感興趣的產品服務信息但所收集括:姓名住址電郵或者電話號碼等等重要的個人信息。
  4. Wap includes a specification called wtls ( wireless transportation layer security ) which implements options for authentication and encryption. wtls ensures data integrity, privacy, and authentication and is optimized for use in the mobile environment

    無線應用系統規約括一套名為無線傳輸層保安( wirelesstransportationlayersecurity ,簡稱wtls )的規格,提供額外認證及加密的功能。該系統確保的完整性、性及真確性,也專為流動通訊環境而設。
分享友人