核攻擊威脅 的英文怎麼說
中文拼音 [hégōngjīwēixié]
核攻擊威脅
英文
nuclear attack threat-
Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model
中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。At best, therefore, the extra defences can offer a little bit of extra insurance in a crisis, by helping to persuade an aggressor that an attack, or a threatened one in an attempt at nuclear blackmail, might well fail and invite retribution instead
因此,新的防禦系統能夠充其量使那些挑釁者明白一次進攻或者核訛詐威脅很難得逞,甚至很有可能招致反擊,這樣能在危難時刻提供些許額外的安全保障。Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity
該文首先對國內外拒絕服務攻擊威脅以及研究現狀進行分析描述;然後,從拒絕服務攻擊的方法分類、主要手段、常見的防禦及防範方法分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務攻擊進行有效過濾的方法,並用這種方法在linux內核中實現了一個高速過濾器,最後進行了相關的性能測試。Supporters of the star wars defense system hope that this would not only protect a nation against an actual nuclear attack, but would be enough of a threat to keep a nuclear war from ever happening
譯文:星球大戰防禦系統的支持者們希望它不僅能保護一個遭受核攻擊的國家,也希望它能成為使核攻擊永不發生的足夠威脅。In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management
筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全攻擊路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全需求,採用多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內核、防病毒等,設計出了保護中間業務的技術安全防護方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。分享友人