易受攻擊性 的英文怎麼說
中文拼音 [yìshòugōngjīxìng]
易受攻擊性
英文
susceptibility- 易 : Ⅰ形容詞1. (容易) easy 2. (平和) amiable Ⅱ動詞1. (改變; 變換) change 2. (交換) exchange Ⅲ名詞(姓氏) a surname
- 攻 : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 易受 : liable to
- 攻擊性 : aggressiveness
- 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
-
So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security
但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems
2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測攻擊和服務器端假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種攻擊手段的防範能力。This flexibility, however, comes at a big cost - your system is more vulnerable to bad data
然而,獲得這種靈活性所付出的代價相當昂貴您的系統會更容易受到壞數據的攻擊。The network is liable to be attacked by the hacker and virus because of the fluidness of information, the distribution of resource, the opening of connection and diversity of connection forms. so the security problem is become more and more serious
由於計算機網路具有信息的流動性,資源的分佈性,連接的開放性和連接形式的多樣性等特徵,致使網路易受到黑客和病毒的攻擊,因此計算機網路的安全問題變得越來越突出。Yet small open economies cannot have an independent monetary policy ( indeed, several have currency boards ) and are vulnerable to external shocks and speculative attacks
然而,開放的小國經濟體不可能擁有一個獨立的貨幣政策(的確,一些國家有通貨委員會) ,而且,它們極易受到外部沖擊和投機性攻擊的傷害。Up until tuesday, the police had seemed to discount any suggestion that the attackers might be suicide bombers - an idea that would almost certainly deepen apprehensions among britons used to perceiving such attacks as a phenomenon of the middle east or iraq
直到星期二以前,警方還對襲擊是自殺性攻擊的說法還是半信半疑,但這對習慣把人體炸彈看成中東和伊拉克現象的大不列顛人來說,是很容易接受的。The specific nature of the security hole, such as whether it makes the vulnerable to outsiders or allows virus - like code to enter the operating system, was not made clear
上述安全漏洞的性質,諸如其是否會導致計算機易受外部攻擊,或是使得諸如蠕蟲病毒的代碼進入操作系統,現在還不得而知。For the purpose to perfect the risk assessment of major hazard installation, a vulnerability assessment methodology for industrial facilities is developed on the basis of relativity between target selection of attack and certain inherence of industrial facilities ( especially the industrial facilities involve a store of chemical or energy )
摘要為使重大危險源風險分析更加完善,從攻擊者的角度分析工業設施(主要指化學物質或能量聚集的工業設施)固有特徵中影響襲擊目標選擇的諸因素,提出易受攻擊性指標。Finally we analized the aes algorithm and its application in ipsec protocol. ( 2 ) because the communication of ip datagram has charaisteristics of itself, we analized the influence that ip datagram communication does on encryption modes, and put forward some design rules
( 2 )加密技術的安全性不但和演算法有關,而且和密碼模式也有關,一種模式在這個環境中是安全的,在另外一個環境可能容易受到攻擊。He claims that the new bond is more human and vulnerable than the character has been in previous movies
他聲稱;新的詹士幫的性格比以往舊日的影片更具人性化和更易受攻擊。Digital video watermarking is a powerful tool for video copyright protection and security authentication. video data is redundancy, so video watermark usually encounters synchronization attacks, such as frame dropping, cut - paste etc, how to improve synchronization attack - resistance of video watermarking has become an important research trend
數字視頻水印是版權保護和安全認證的有力工具,而視頻的高冗餘性特徵使得視頻水印極易受到幀切除、剪切-復制等同步攻擊,如何提高視頻水印的同步魯棒性成為數字視頻水印的重要研究內容。Secondly, because the system is vulnerable in the process of key producing and signing, we apply a distributed rsa algorithm to the key producing process and adopt a structure of two - level secret shares storing the private key to improve its security
其次,根據系統在私鑰產生和簽名階段易受攻擊的特性,將分散式rsa演算法應用到私鑰的產生過程,並在簽名過程中採用雙層共享結構存儲私鑰,以提高私鑰的安全性。There must be more application systems and more users in our campus network in future. this complexion can bring two problems : first, the possibility that cwiss are attacked by hacker is higer because the more and more resource in our cwiss. second, users have to supply their accouts and password repeatedly when they want to enter different systems, the method is to fussy, more important, can lost the password, canse fatal lost
今後還會不斷增加新的應用系統,用戶數量也會不斷增加,這樣就帶來了信息安全方面的兩個問題:一是上網的信息資源越多,受黑客攻擊的可能性越大(尤其是一些敏感數據) ,二是眾多用戶面對多個系統要重復輸入帳號、口令等信息,不僅煩瑣,更重要的是容易出現口令丟失,一旦口令泄漏會造成不可估量的損失。These networks also behave in certain predictable ways ; for example, they are remarkably resistant to accidental failures but extremely vulnerable to coordinated attacks
這些網路也具有某些可預期的運作特性:比如,對意外故障有驚人的承受力,但若遭到協調式攻擊,則很容易受到破壞。Voip transmits voice over an open network, and the voice data includes a great deal of important information, so it needs much more securities than the traditional data communications
網路語音通信系統需要考慮的另外一個因素是其安全性。網路語音通信是在開放的網路上進行的,因此,它比傳統的語音通信更容易受到攻擊。Computer network has been characterized by features like heterogeneous connection, uneven dispersiveness and openness, which also result in its vulnerability to be attached by hackers, malicious unauthorized intrusion. that ' s why network security has been attracting people ' s attention in various fields
但由於計算機網路具有聯結形式多樣性、終端分佈不均勻性和網路開放性等特徵,致使網路容易受黑客、惡意軟體和其他不軌的攻擊,網上信息的安全和保密已受到人們廣泛的關注。分享友人