易受攻擊性 的英文怎麼說

中文拼音 [shòugōngxìng]
易受攻擊性 英文
susceptibility
  • : Ⅰ形容詞1. (容易) easy 2. (平和) amiable Ⅱ動詞1. (改變; 變換) change 2. (交換) exchange Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 易受 : liable to
  • 攻擊性 : aggressiveness
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣、終端分佈不均勻和網路的開放、互連等特徵,致使網路黑客、駭客、惡意軟體和其它不軌的,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  2. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次口令認證機制。針對postgresql原有認證機制具有口令猜測和服務器端假冒的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種手段的防範能力。
  3. This flexibility, however, comes at a big cost - your system is more vulnerable to bad data

    然而,獲得這種靈活所付出的代價相當昂貴您的系統會更容到壞數據的
  4. The network is liable to be attacked by the hacker and virus because of the fluidness of information, the distribution of resource, the opening of connection and diversity of connection forms. so the security problem is become more and more serious

    由於計算機網路具有信息的流動,資源的分佈,連接的開放和連接形式的多樣等特徵,致使網路到黑客和病毒的,因此計算機網路的安全問題變得越來越突出。
  5. Yet small open economies cannot have an independent monetary policy ( indeed, several have currency boards ) and are vulnerable to external shocks and speculative attacks

    然而,開放的小國經濟體不可能擁有一個獨立的貨幣政策(的確,一些國家有通貨委員會) ,而且,它們極到外部沖和投機的傷害。
  6. Up until tuesday, the police had seemed to discount any suggestion that the attackers might be suicide bombers - an idea that would almost certainly deepen apprehensions among britons used to perceiving such attacks as a phenomenon of the middle east or iraq

    直到星期二以前,警方還對襲是自殺的說法還是半信半疑,但這對習慣把人體炸彈看成中東和伊拉克現象的大不列顛人來說,是很容的。
  7. The specific nature of the security hole, such as whether it makes the vulnerable to outsiders or allows virus - like code to enter the operating system, was not made clear

    上述安全漏洞的質,諸如其是否會導致計算機外部,或是使得諸如蠕蟲病毒的代碼進入操作系統,現在還不得而知。
  8. For the purpose to perfect the risk assessment of major hazard installation, a vulnerability assessment methodology for industrial facilities is developed on the basis of relativity between target selection of attack and certain inherence of industrial facilities ( especially the industrial facilities involve a store of chemical or energy )

    摘要為使重大危險源風險分析更加完善,從者的角度分析工業設施(主要指化學物質或能量聚集的工業設施)固有特徵中影響襲目標選擇的諸因素,提出易受攻擊性指標。
  9. Finally we analized the aes algorithm and its application in ipsec protocol. ( 2 ) because the communication of ip datagram has charaisteristics of itself, we analized the influence that ip datagram communication does on encryption modes, and put forward some design rules

    ( 2 )加密技術的安全不但和演算法有關,而且和密碼模式也有關,一種模式在這個環境中是安全的,在另外一個環境可能容
  10. He claims that the new bond is more human and vulnerable than the character has been in previous movies

    他聲稱;新的詹士幫的格比以往舊日的影片更具人化和更
  11. Digital video watermarking is a powerful tool for video copyright protection and security authentication. video data is redundancy, so video watermark usually encounters synchronization attacks, such as frame dropping, cut - paste etc, how to improve synchronization attack - resistance of video watermarking has become an important research trend

    數字視頻水印是版權保護和安全認證的有力工具,而視頻的高冗餘特徵使得視頻水印極到幀切除、剪切-復制等同步,如何提高視頻水印的同步魯棒成為數字視頻水印的重要研究內容。
  12. Secondly, because the system is vulnerable in the process of key producing and signing, we apply a distributed rsa algorithm to the key producing process and adopt a structure of two - level secret shares storing the private key to improve its security

    其次,根據系統在私鑰產生和簽名階段的特,將分散式rsa演算法應用到私鑰的產生過程,並在簽名過程中採用雙層共享結構存儲私鑰,以提高私鑰的安全
  13. There must be more application systems and more users in our campus network in future. this complexion can bring two problems : first, the possibility that cwiss are attacked by hacker is higer because the more and more resource in our cwiss. second, users have to supply their accouts and password repeatedly when they want to enter different systems, the method is to fussy, more important, can lost the password, canse fatal lost

    今後還會不斷增加新的應用系統,用戶數量也會不斷增加,這樣就帶來了信息安全方面的兩個問題:一是上網的信息資源越多,黑客的可能越大(尤其是一些敏感數據) ,二是眾多用戶面對多個系統要重復輸入帳號、口令等信息,不僅煩瑣,更重要的是容出現口令丟失,一旦口令泄漏會造成不可估量的損失。
  14. These networks also behave in certain predictable ways ; for example, they are remarkably resistant to accidental failures but extremely vulnerable to coordinated attacks

    這些網路也具有某些可預期的運作特:比如,對意外故障有驚人的承力,但若遭到協調式,則很容到破壞。
  15. Voip transmits voice over an open network, and the voice data includes a great deal of important information, so it needs much more securities than the traditional data communications

    網路語音通信系統需要考慮的另外一個因素是其安全。網路語音通信是在開放的網路上進行的,因此,它比傳統的語音通信更容
  16. Computer network has been characterized by features like heterogeneous connection, uneven dispersiveness and openness, which also result in its vulnerability to be attached by hackers, malicious unauthorized intrusion. that ' s why network security has been attracting people ' s attention in various fields

    但由於計算機網路具有聯結形式多樣、終端分佈不均勻和網路開放等特徵,致使網路容黑客、惡意軟體和其他不軌的,網上信息的安全和保密已到人們廣泛的關注。
分享友人