病毒防護技術 的英文怎麼說

中文拼音 [bìngfángshù]
病毒防護技術 英文
enhanced virus protection
  • : Ⅰ名詞1 (疾病; 失去健康的狀態) illness; sickness; disease; malum; nosema; malady; morbus; vitium...
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 病毒 : [醫學] virus; inframicrobe (濾過性)
  • 防護 : protect; shelter; shield; guard; shielding; protection; proofing
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全措施:存取控制、標識和認證、完整性控制、密碼火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Especially, the necessary security assurance meseares are designed in detail, including e - mail check and filtering, virus detection and protection, firewall configuration, and etc. meanwhile, suggestions for effective security management are put forward according to is017799 standards

    在方案中,特別對電子郵件過濾檢測,入侵檢測,檢測,火墻設置,應用vlan和vpn設備解決敏感資源保和通訊保密問題等多方面提出了具體的解決方案。
  3. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對檢測,提出了基於主機的檢測思想,在客戶端進行
  4. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    層面上,從維銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全措施,包括;身份認證、密碼、訪問控制、火墻、漏洞掃描、入侵檢測、安全審計、黑客入侵、同城災難備份等;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  5. Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security

    江民火墻(新)是一款專為解決個人用戶上網安全而設計的網路安全工具,產品融入了先進的網路訪問動態監控,徹底解決黑客攻擊、木馬程序及網際網路等各種網路危險的入侵,全面保個人上網安全。
  6. Firstly, it introduces the information security theories and technologies used in the study. the information security theories mainly includes ppdr - the dynamic security model, sse - cmm, padminee - the life cycle of information security engineering model, bs7799 - the standard of information security management, the grade - classification standard of information system security protection, iatf - the technical framework of information security guarantee and the principle of wooden pail etc. and the information security technologies consist of the technology of firewall, invasion detection, virus prevention and cure, loophole scanning, the identity certification and the soc etc. then it studies on the designing of the information security guarantee system

    首先,介紹和分析與本研究相關的主要信息安全理論與,其中信息安全理論有ppdr動態安全模型、 sse - cmm系統安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理標準、信息系統安全保等級劃分準則、 iatf信息安全保障框架和木桶安全理論等;信息安全火墻、入侵檢測、計算機、漏洞掃描與評估、身份認證和soc等。
  7. In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management

    筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全攻擊路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全需求,採用多種安全設備如vpn設備、火墻、 ids 、安全管理中心、安全內核、等,設計出了保中間業務的安全方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。
分享友人