防毒墻 的英文怎麼說

中文拼音 [fáng]
防毒墻 英文
mailarmor
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • : 名詞(磚、石等築成的屏障或外圍) wall
  • 防毒 : gas defense; antitoxin防毒面具 gas mask; 防毒面具罐 gas mask canister; 防毒面罩 respirator; 防毒...
  1. W factere w the work of strengthen the security of the enterprise information mp to be the highest priority, the whcle enthely analyses all ldnds of security problems tha a intemal netwrk of stock compan may risk thtough rystematic view. it gives out sollltions fbr the crst systffo wt on wtg, operating systeln, taling system, tu1ti - vinrs, beckalp, secwity edce and physical settings

    在此基礎上,對公司現有系統作出了系統化的安全方案,包括應用技術、 vlav技術和windows2000 )系統的安全機製作出的網路和系統平臺,和系統備份方案,根據公司中心機房建設的規模,以及中心機房所在地的現場條件,分別就空調系統、后備電源系統、雷擊和系統監控給出實施方案。
  2. In - stat recent report shows the integrated security equipment market is on the point of fast development and will reach 3. 3 billion us dollars. the integrated security equipment is a small box with several secure function including firewall, vpn, defense to inbreak and kill computer virus

    In - stat近期報告,集成安全設備市場即將出來大幅增長,到2009年將達到33億美元,集成安全設備是一種具有各種安全功能的小盒。這些功能包括與vpn 、入侵護以及殺功能,一些產品可能還帶有內容過濾、反垃圾郵件以及木馬功能。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全護措施:存取控制、標識和認證、完整性控制、密碼技術、系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於軟體的主動禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動禦措施。
  5. This could be a web server, antivirus software, firewall, and so on

    該軟體可以是web服務器殺軟體等。
  6. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網、網路入侵檢測系統、病護體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。
  7. “ as an effective solution to combat viruses and other forms of malicious code as well as providing a quality firewall service ”

    整合了反病和備份軟體的整體解決方案,正在瞄準肥厚的反病用戶市場,我們完全有理由相信一場血雨腥風即將拉開帷幕
  8. The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection

    電腦網路究竟有多安全?本節目會探討電腦軟體安全的嚴重性,以及電腦病木馬程式和蠕蟲攻擊軟體的方式。另外,亦會介紹如何利用保護電腦網路。
  9. Virus defence includes antivirus software, fireproof, generic decryption and digital immunity system

    範可採用反病軟體、、類屬解密和數字免疫系統等新型反病措施。
  10. Especially, the necessary security assurance meseares are designed in detail, including e - mail check and filtering, virus detection and protection, firewall configuration, and etc. meanwhile, suggestions for effective security management are put forward according to is017799 standards

    在方案中,特別對電子郵件過濾檢測,入侵檢測,病檢測,設置,應用vlan技術和vpn設備解決敏感資源保護和通訊保密問題等多方面提出了具體的解決方案。
  11. Many natural phenomena will suffice. the trick is they must have some measurable property with behavior that is at least as good as random if not actually random. this sort of randomness is introduced at the quantum mechanics level

    但是由於大多數計算機用戶不太了解安全性,大多數專門講述計算機安全性方面的書籍僅僅涉及一些基本的技術問題,例如,什麼是,什麼時候使用des加密演算法或者哪個產品最好。
  12. To solve the security of interconnection network, some merchants proposed the firewall and the anti - virus software scheme plan

    針對網間互聯的安全問題,有些廠商提出了軟體的方案。
  13. A deep packet inspection engine will enable the asic to quickly inspect packet payloads to identify potential security threats, such as worms, that would pass through existing firewall solutions unchecked

    高級的包偵測引擎將能夠使asic快速偵測包的有效載荷以便識別潛在的安全威脅,例如現在那些將通過而不能阻止的蠕蟲病信息包。
  14. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、、漏洞掃描、入侵檢測、安全審計、黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  15. It works both as a classic protection of file - servers and, via its optional plug - ins, as a protection of various subsystems running on the server, including electronic mail, firewall proxy etc

    4 server edition為文件服務器提供一流的病護,而且通過它的插件,有效護服務器上的子系統,包括電子郵件,代理等
  16. In the end, this paper forecasts the future of the firewall. it will grow with the development of network security. three functions including anti - virus, self - active proxy, parallel running will be implemented in the next version

    最後展望了隨著網路技術的發展,今後該要加入的新功能:功能、主動代理功能、全方面并行功能。
  17. Security managment can be connected into the firewall, inbreaking testing software, leak scaning equipment and virus - resistance software so that it can integrate their security functions

    安全管理還可以接入、入侵檢測、漏洞掃描、病治等軟體或設備,集成它們的安全功能。
  18. Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security

    江民(新)是一款專為解決個人用戶上網安全而設計的網路安全護工具,產品融入了先進的網路訪問動態監控技術,徹底解決黑客攻擊、木馬程序及網際網路病等各種網路危險的入侵,全面保護個人上網安全。
  19. The tool - free serial number and id escalation rising rising antivirus and firewall, only for the escalation rising test functions, do not use illegal and downloaded within 24 hours of deleted

    本工具可以免序列號及id升級瑞星殺及瑞星,僅用於測試瑞星的升級功能,請勿非法使用,並在下載后24小時內刪除
  20. So network security becomes the sticking point of internet applications. in order to enhance the security of internet, provide steady and safe services, a lot of security technologies and measures are used to protect the networks. intrusion detection is one of those technologies that have done well in this field

    網路安全技術是計算機工作者在解決網路安全問題的過程中不斷拓展和豐富的一門學科,它包括技術, vpn技術,加密技術,病治技術,入侵檢測技術等。
分享友人