防黑客入侵 的英文怎麼說

中文拼音 [fánghēiqīn]
防黑客入侵 英文
anti-hacking
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  1. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了邊界火墻及現有主機火墻的不足之處;對現有的網路攻擊手段與方法進行分析研究,並對禦這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機火墻在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、檢測等火墻技術,設計了一種企業網中的主機火墻模型,並對這一模型進行了較深地研究。
  2. Just as burglar alarms alert homeowners when someone has broken through a locked window or door, intrusion - detection systems alert system administrators when hackers have gotten past a firewall, making it possible to thwart the attack and even track down the intruder

    正像有人破窗或破門而盜警報警告房屋主人那樣,當突破火墻時,探測系統就警告系統管理員,使得有可能挫敗,甚至也可能追捕者。
  3. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、病毒、火墻、漏洞掃描、檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  4. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,頻頻網路,網路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的禁止策略來進行禦。目前採用的手段有火墻、加密、身份認證、訪問控制、安全操作系統等,這些對系統非法都起到一定的作用。然而從系統安全管理角度來說,僅有禦是不夠的,還應採取主動策略。
  5. Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security

    江民火墻(新)是一款專為解決個人用戶上網安全而設計的網路安全護工具,產品融了先進的網路訪問動態監控技術,徹底解決攻擊、木馬程序及網際網路病毒等各種網路危險的,全面保護個人上網安全。
  6. This paper firstly summarizes the traditional network information security techniques, the common intrusion methods and their countermeasures. then it discusses the intrusion detection system ' s evolution, classification, detection methods, standardization and etc. aiming at the new encountered problems about intrusion detection, this paper brings forward a design project of the intrusion detection system

    本文在概述傳統網路信息安全技術,常用手段與範對策,檢測系統的發展、分類、檢測方法以及標準化等問題的基礎上,針對目前檢測遇到的一些新問題,提出了一個檢測系統的設計方案。
  7. Due to the some normal ids ' s low efficiency, high error report rate, bad self - security, this thesis has given out a new - type hybrid intrusion detection system ( hsids ) design with high efficiently, good self - security, combining the distrubited information gathering with the centralized managerment, and combining the nid and the hid. the detailed design scheme also has been presented. the hsids adopts the " black hole " hidden setting, greatly decreasing the posiblity for hacker to discover and attack the hsids

    在hsids中,採用「洞」式隱形設置,可以大大減少hsids系統被發現並攻擊的可能;系統採用的將nid與hid相結合的方式可降低信息的漏報與誤報率;改進的檢測演算法提高了檢測引擎的速度;採用開放的檢測規則方便了系統的升級,提升了檢測能力; web方式的安全管理可以很好地控制整個監控網路的安全情況;被動禦與主動禦相結合更有效的止了者對系統的
  8. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和攻擊與問題,詳細討論綜合採用差錯控制、火墻、數據加密解密等技術手段提高系統的網路安全性能。
  9. Considering flaws of other types of firewalls, i integrate the firework techniques with the security supervision system of networks in aim to improve the ability of fireworks to foil the invasion of hackers or computer bugs and to supervise the whole system at any time

    由於火墻具有不足之處,現將火墻和網路安全監測系統結合起來,則能克服現行網路安全護系統無法對及病毒攻擊行為實時進行監控識別的缺陷,擔負起整個網路系統的安全護任務。
  10. The theme comes from several projects, such as " hacker monitoring technology research " ( national 863 program, serial number : 2001aa142100 ), and " integrated network security defensive system " ( national 863 program, serial number : 2003aa142060 ) sponsored by national high - tech research development program ; " intelligence distributive realtime network intrusion defence technology research " ( serial number : 20010699018 ) sponsored by national education department doctor fund

    論文選題來源於國家高技術研究發展計劃資助項目「監控技術研究」 ( 863計劃,課題編號: 2001aa142100 ) 、國家高技術研究發展計劃資助項目「集成化網路安全衛系統」 ( 863計劃,課題編號: 2003aa142060 ) 、國家博士點基金項目「智能分佈實時網路禦技術研究」 (課題編號: 20010699018 ) 。
  11. D system security control - advanced security devices against hacker attack ; access control features ; regular security assessment and audit

    D系統保安管制安裝了先進的保安裝置,設置了接達監控功能定期進行保安評估及審查。
  12. Govwifi has put in place appropriate security measures, e. g. peer - to - peer blocking to prevent hacking or attack by neighbour wireless users, and content filtering to guard against unintended access to indecent content

    政府wi - fi無線上網設施已採取適當保安措施,例如點對點堵截以或鄰近無線用戶的攻擊,及內容過濾保護以避免無意地瀏覽不雅的內容。
  13. The security of computer network consists of pretending the invasion of net virus and hackers. we can keep back the net virus using software of anti - virus, such as kv3000 and rising

    對于網路病毒,我們可以通過kv300或瑞星殺毒軟體來對付,那麼對于我們能採取什麼樣的措施呢
分享友人