非授权访问

  • 网络Unauthorized Access;no-authorized access;Non-Authorized Access
非授权访问非授权访问
  1. 非授权访问,实施攻击的技术包括目录攻击和伪造消息

    Unauthorized access using techniques such as dictionary attack and falsified message

  2. 大多数时间,不会针对此基础设施内的用户的非授权访问对其内容进行保护。

    Most of the time , its content is not protected against unauthorized access from the users in this infrastructure .

  3. 采用序列号分析法对MAC地址欺骗进行检测,从而对无线网络的非授权访问进行监控。

    MAC address spoofing is detected using sequence number analysis method and unauthenticated access on wireless network is monitored .

  4. 新协议能够有效抵抗非授权访问、假冒攻击、重放攻击、DoS攻击等安全攻击,在提高安全性的同时,提高了认证协议的可用性。

    The new protocol can counteract effectively series of the security attack as replay attacking , fake attacking , and DoS attacking and so on .

  5. 该机制可有效地阻止对EPCIS系统和资源的非授权访问,从而确保对EPCIS访问的安全性。

    The mechanism can guarantee safe access to EPCIS system by preventing the unauthorized access to EPCIS system or resources .

  6. 您可以使用另一个未经授权处理任务的用户身份登录,以确保不管是否应该在To-Do列表中显示任务,非授权访问都可以正常运行。

    You will log on as another user not authorized to work on the task to make sure unauthorized access is also working as it should and not show the task in the user 's To-Do list .

  7. 利用该机制,可以抵抗非授权访问和身份欺骗。

    By these two ways , the mechanism can protect active applications from un-authorization access and masquerading .

  8. 与其他网络技术一样,蓝牙网络在安全性方面也面临各种威胁,如假冒、窃听、非授权访问、信息丢失和损坏、抵赖、伪造、服务拒绝等。

    As other communication technique , the Bluetooth is faced with various kinds of threat such as masquerade , eavesdropping , unauthorized access , and denial of service etc.

  9. 该方案主要包括两个方面内容:一、利用Java2沙箱控制主机资源的存取,防止主机资源被移动代理非授权访问;

    It is composed of two aspects : first , it uses the Java sandbox to control the access of host resource , thus it can prevent the host resource from being accessed by agents without authority ;

  10. 该实现方案有效地保护资源免受非授权访问,降低了授权管理的复杂性,提高了信息管理系统对象和数据的安全性。

    The scheme not only can protect the data being accessed unauthorized effectively , at the same time , reducing the complexity of authority management , but also can improve the security of object and data in the MIS .

  11. 对网络安全的威胁主要表现在:非授权访问,冒充合法用户,破坏数据完整性,干扰系统正常运行,利用网络传播病毒,线路窃听等方面。

    As follows , the main threats to network security is : non-authorized visits , pretend to be legitimate users , breaks the integrity of data , disrupts the normal operation of a system , spread internet viruses , networks sniffs and so on .

  12. 针对XML文档的访问控制保证XML文档中的敏感信息不会受到非授权的访问。

    Access control for XML documents ensure that sensitive information stored in the documents will not be accessed by unauthorized users .

  13. 您已经学习了如何在ApacheGeronimo应用服务器上创建并且部署应用程序,保护目录内容不受非授权的访问。

    You 've learned how to create and deploy an application on the Apache Geronimo application server , securing directory content from unauthorized access .

  14. 访问控制可以保证合法用户访问合理资源的前提下,限制非授权用户访问系统资源以及合法用户对系统资源的非法使用。

    Access control ensures legitimate users access to legal resources , and restrict to non-authorized users to access system .

  15. 电子政务系统的安全目标是防止来自外部和内部的各种入侵和攻击,防止非授权的访问,防止各种冒充、篡改和抵赖等行为,防止信息泄密和被破坏。

    The security aim of E-Government Affairs is to prevent all kinds of intrusion and attack , access without authorization , imitation , juggle , disavowal from exterior and inside .

  16. 网络安全通常依靠防火墙技术,采用访问控制机制限制非授权的访问,但防火墙技术对于合法用户的恶意访问或攻击是无能为力的,这导致了入侵检测系统的开发与研究。

    Often rely on network security firewall technology , restricted by access control mechanisms unauthorized access , firewall technology , but for validated users to access or malicious attacks are powerless , which led to the development and research of intrusion detection systems .

  17. 为了更好地防范非授权的访问,保护网络和信息安全,必须及时下载安全补丁,来保证IT环境安全,使系统处于高效和最新工作状态。

    For the sake of better prevention of unauthorized access and protection of network and information security , the customer must have a timely download of security patch in order to guarantee the IT environment in a safe , effective and up-to-date work state .

  18. 通过取代个人识别码和口令等,指纹识别技术可以阻止非授权人的访问。

    Fingerprint recognition technology can prevent unauthorized access by replacing the personal identification code and password .

  19. 但是,以IP为核心的网络必须面对网络存在严重安全问题的严峻事实,最常用最有效的方法是采用各种技术手段维护正常的授权用户的访问,阻止非授权用户的非法访问。

    However , the IP network as the core network must face the serious security issues grim fact , the most commonly used method is the most effective use of a variety of technical means to maintain a normal visit to authorized users and prevent unauthorized users of illegal access .

  20. 在数据库应用系统中,如何保证数据的安全、防止非授权用户的非法访问和修改,已成为一个重要的问题。

    In database system , it is a serious problem how to protect data security and to prevent unauthorized user 's modification .