physical access 中文意思是什麼

physical access 解釋
實體的接取
  • physical : adj 1 物質的,有形的,形而下的 (opp psychical spiritual mental moral); 確鑿的;外界的。2 身體的...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. Persons with physical handicaps : improve the access and related facilities in church, service building, retreat houses, pastoral centres and all church organizations for those with disabilities, e. g. construction of slopes, elevators, toilets for people with disabilities, braille bibles, hymn books and parish newsletters, earphones for the hearing impaired to listen to homilies during mass and sign language interpreter during liturgies

    傷殘人士:改善通道及有關設施,以加強傷殘人士對社會的參與,例如:聖堂服務大樓避靜所牧民中心以及各教會機構應提供傷殘人士適用的通道及設施斜路凹凸紋膠條的路面凸點字標記可供輪椅出入的升降機洗手間凸字聖經歌書堂區通訊以及為弱聽人士而設的耳機系統輔助神父講道的無線調頻系統等。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. There will be circumstances where physical access to the switch can be achieved, but access to the user or privileged exec mode cannot be gained because the passwords are not known or have been forgotten

    會有一些情況必須實際存取交換器,但因為不知道或忘掉密碼,就不能夠取得存取使用者或特權的執行模式的權力。
  4. Physical access to the hardware allows users to bypass software checks by installing keyloggers, taking away hard drives and reading them in other machines, sniffing network traffic, and so on

    通過安裝擊鍵記錄器( keyloggers ) 、取走硬盤驅動器並在其他機器中讀取、嗅探網路傳輸等等,對硬體物理上的訪問可以讓用戶繞過軟體檢查。
  5. For many persons with disabilities, physical access to hardware and software is a problem, although the access is not an end in itself

    對于不少殘障人士來說,身體缺陷對他們使用電腦軟硬體會構成障礙,但是這個問題並非不能解決。
  6. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  7. These provide physical access to memory devices, and are not used directly

    這些模塊提供對內存設備的物理訪問,但並不直接使用它們。
  8. This is just as important as physical access

    這與物理訪問同樣重要。
  9. Physical access versus proximity

    物理接入vs .無線信號范圍
  10. Hardware designed to control physical access to venues in a professional way

    專為場館控制實際進出所設計的專業硬體,
  11. Is physical access to computer centres and telephone exchanges etc. controlled

    有否管制進入電腦中心、辦公室、電話中樞和接駁系統等地方?
  12. It refers to physical access to a facility, specific work areas, or computer systems

    指實體性地接達某一設施、特定工作范疇或電腦系統。
  13. Is physical access to computing resources and communication links controlled and monitored

    有否管制和監察進入存放電腦資源及通訊鏈路人士的身分?
  14. Tapping into traditional wired local area networks requires some sort of physical access

    侵入傳統的有線局域網( local area network )需要某種物理接入。
  15. Physical access to your servers and your databases may be compromised allowing an unauthorized user to access them

    對服務器和數據庫的物理訪問可能受到危害,使未授權用戶得以訪問它們。
  16. The vulnerability could allow a malicious user with physical access to a domain controller to install malicious software on it

    該漏洞使惡意用戶可以通過物理方式將惡意軟體裝入域控制器。
  17. Customers concerned about the security of their information in these systems should secure it by activating passwords and using physical access controls

    如果客戶關注系統中信息的安全,就應設置密碼,並將系統置於限制進出的地點。
  18. Other applications could further widen the market, such as physical access control in corporations and prisons or the use of fingerprints as digital signatures for electronic commerce

    其他方面的應用可能再擴大這個市場,例如公司和監獄的門禁控制,或是使用指紋當做電子商務的數位簽署。
  19. Physical access control smart cards can be personalized to control access to restricted facilities, depending on user privileges and time restrictions. for example, campus identity card of universities and residential card is adopted in some private estates

    只需設定用戶的權限及使用時限,便能對該人進出受管制設施加以控制,例如:大學的學生證及近來被私人屋苑所採用的住戶證。
  20. Some information about ups customers and their packages is stored in shipping systems located on customer premises. customers concerned about the security of their information in these systems should secure it by activating passwords and using physical access controls

    有些客戶資料及包裹資料會存儲在客戶地點的遞送系統中,若客戶關注系統中資料的安全,應設置密碼,並將系統置於限制進出之地點。
分享友人