security threat 中文意思是什麼

security threat 解釋
安全感脅
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • threat : n. 1. 恐嚇,威嚇,威脅。2. 兇兆,(…的)樣子,(…的)危險。vt. ,vi. 〈古、方〉=threaten.
  1. Sixth : under the charter of the united nations, we are asking tonight that an emergency meeting of the security council be convoked without delay to take action against this latest soviet threat to world peace

    第六:根據聯合國憲章,我們要求立刻召開安理會緊急會議,好對蘇聯最近對世界和平的威脅採取行動。
  2. The united states has raised its national security threat level for all commercial air flights and has barred pa engers from carrying liquids aboard any planes

    美國提高了所有民用航班的安全威脅警戒級別,並禁止乘客攜帶任何液態物品登機。
  3. The united states has raised its national security threat level for all commercial air flights and has barred passengers from carrying liquids aboard any planes

    美國提高了所有民用航班的安全威脅警戒級別,並禁止乘客攜帶任何液態物品登機。
  4. Keystroke loggers are a particularly dangerous security threat because users typically don ' t realize they ' re even there

    擊鍵記錄者是特別危險的安全威脅,因為他們即使存在,用戶通常也沒有察覺到。
  5. China faces a national security threat : its rivers and seas are dying ? and polluting industries are to blame

    中國的河流和海洋因受污染而在走向死亡,並因此在威脅著該國的生態安全。這其中,污染行業難辭其咎。
  6. Whether it ' s an email virus or malicious website, amon keeps your computer safe by blocking the security threat from causing harm

    是否是一個郵件病毒或惡意網站,患可以讓您的電腦安全,通過阻斷安全威脅造成損害
  7. Sending user account names or passwords in e - mail is a potential security threat

    在電子郵件中發送用戶帳戶名或密碼會對安全造成潛在威脅。
  8. Web services use open communication protocols and run outside the corporate firewall, which poses a very real security threat when these systems are deployed in the enterprise

    Web服務使用開放通信協議並在組織的防火墻之外運行,當在企業中部署這些系統時,這將會造成非常實際的安全性威脅。
  9. Fatalness exists in the travel and travelers ’ manage ability is limited, so that travel operator should bear security responsibility and obligation. however, supplier of services who is not controlled by the tour operator is in fact the tour operator ’ s assistant in performing the travel contract, and invader causes security threat. an appropriate limitation on tour operator ’ s responsibility should be adopted

    所以,法律應當界定旅遊營業人安全保障義務的內涵和性質,針對不同的主體可能造成的危險規定具體的義務和責任,以及責任的減免和限制,從而建立盡可能平衡各方主體利益,又能減少、避免旅遊意外發生的旅遊營業人安全保障義務、責任體系。
  10. Security threat analysis and strategy in industrial control system

    工業控制系統中安全威脅分析與策略
  11. Running a report under an account that has elevated permissions exposes your sql server to a security threat if the report query contains malicious transact - sql statements for example, statements that create unauthorized logons, modify or delete data, or introduce erroneous data, and the report is run by a user who has elevated permission on the server that hosts the data source

    如果報表查詢包含惡意的transact - sql語句(例如,用於創建未經授權的登錄名、修改或刪除數據、或引入錯誤數據的語句) ,而且該報表由具有對承載數據源的服務器的提升權限的用戶運行,則使用具有提升權限的帳戶運行該報表將使sql server面臨安全隱患。
  12. Web brings the opportunity and challenge to the development of traditional library, but the randomness, incompleteness, disorder, difficulty in long - term saving, information security threat, over - expansiveness and inconvenience of reading of web reference become the factors that restrict the course of replacement of traditional library by web one

    摘要網路為傳統圖書館的發展帶來了機遇和挑戰,但網路文獻存在的隨意性、不全面性、無序化、難以長期保存、信息安全威脅、使用費用過高以及閱讀不便等問題成為了制約網路替代傳統圖書館進程的因素所在。
  13. Hard - coding a password is a security threat

    對密碼進行硬編碼存在安全威脅。
  14. Firstly, the thesis analyzes the goal of computer network security and the security threat of network faced, and then introduces several traditional security techniques such as data encryption techniques and firework techniques. it analyzes the problems of these traditional security techniques and brings forward combine intrusion detection system ( ids ) and the traditional network security techniques to create multi - layers recovery system. it indicates the status in security domain and its significance of ids

    本論文在分析了計算機網路安全的目標以及網路所面臨的安全威脅基礎上,討論了幾種傳統的計算機網路安全技術,如數據加密技術、防火墻技術等,並分析了傳統網路安全技術存在的不足,在此基礎上提出了以入侵檢測技術與傳統的計算機網路安全技術相結合的多層次防禦體系,指出了入侵檢測系統在整個安全領域中的地位以及研究ids的重要意義。
  15. On the basis of deeply analyzing the wireless ip network security threat and existing design requirement, we put forward the design requirements of key exchange protocol in wireless ip network

    在深入分析了無線ip網路的安全威脅和現有的設計要求的基礎上,我們提出了無線ip網路中設計密鑰交換協議的要求和目標。
  16. This thesis is divided into four sections : section one : analysis of non - traditional security. the concept of traditional security. the connotation of traditional security should be defined from two aspects. from the aspect of content, traditional security refers to security threat in the fields of politics and military, especially with the scope of national sovereignty and sovereignty right over territory. from aspect of solving means, military means is the solution to traditional security threat. compared to traditional security, non - traditional security is a new problem. the concept of non - traditional security can be defined by the way of exclusion, that is, non - traditional security refers to the security problems except traditional national sovereignty and territorial integrity. through the analysis and comparison to the differences between their main part, field and means, we can outline the division between non - traditional security and traditional security, and further illuminate the concept of non - traditional security

    非傳統安全與傳統安全相比較具有跨國性、擴散性、威脅來源不明確等特點,它在給國際社會帶來巨大危害的同時,對國際關系也產生重大影響。要預防和解決非傳統安全給人類造成的危機,必須加強全球合作和區域性合作,合作需要遵循一定的原則和規則,按照一定程序進行,這都是國際法的內容。國際合作與國際法密不可分,但是國際法的理念及具體內容與國際社會的現實存在著深刻的矛盾。
  17. Is one of the countries under the darkest shadow of non - traditional security threat and u. s. army forces is experienced to a certain extent in dealing with the problem and which is changing with the development of non - traditional security situation. china is also facing the same threat, but in the process of implementation chinese army forces lacks a theoretic foundation

    美國是世界上遭受非傳統安全威脅最為嚴重的國家之一,美軍在參與應對非傳統安全政策上有著一定的實踐經驗,並隨著非傳統安全形勢的變化在發生著一定的變化。中國也同樣面臨著非傳統安全威脅,中國軍隊在參與應對非傳統安全的政策實踐過程中還缺乏一定的理論基礎。
  18. Then, it introduce several cryptographic protocol based on elliptical curve, including diffie - hellman key switching, elgamal encryption and decryption, elgamal digital signature, ecdsa, etc. based on these, the author analyze kinds of security threat faced to 3g system and discuss the security rule and security objectives

    然後介紹了基於橢圓曲線的幾種密碼協議,包括diffie ? hellman密鑰交換, elgamal加解密, elgamal數字簽名, ecdsa等協議。在此基礎之上,分析了3g系統面臨的各種安全威脅並對系統的安全原則和安全目標進行了討論。
  19. Accepting user input is a potential security threat

    接受用戶輸入存在潛在的安全威脅。
  20. About a national security threat

    並且討論有關于威脅國家安全的事情?
分享友人