1) logical threats
推理威胁
1.
The security problems of system design based on Web can be divided into four kinds such as balefully register,logical threats,wilful input and rude permission.
基于Web的系统设计中的安全问题可以分为恶意注册、推理威胁、非善意输入和权限粗陋等四种,解决这些问题的对策有附加码技术、信息隐蔽、强制输入检查和层次式角色等级安全模型。
3) Physical Threat
物理威胁
4) psychological threat
心理威胁
6) UTM
统一威胁管理
1.
The concept of UTM(Unified Threat Management)conforms to the trend of integration in security protection.
统一威胁管理(UTM:Unified Threat Management)概念符合安全防护技术一体化、集成化的发展趋势。
2.
Through the use of UTM (unified threat management) products,Use firewall and VPN (virtual private network) technologies to enable SMEs to establish secure system in a unified framework,In less investment costs on the basis of the network to provide comprehensive protection for SMEs.
通过使用UTM(统一威胁管理)产品,利用防火墙和VPN(虚拟专用网)技术使中小企业能够在一个统一的架构上建立安全基础设施,在较少投资成本的基础上为中小型企业提供全面的网络保护。
3.
To change the situation of that all kinds of threats prevail hereinbefore,a design of UTM based on multi-core network processor is discussed mainly.
针对上述网络混合威胁盛行的现状,提出了一种基于多核网络处理器的统一威胁管理(UTM)的设计思想,介绍了UTM的硬件结构设计、多核网络处理器的结构以及UTM软件的体系结构设计,能较好地适应网络环境对高性能以及应用层数据处理的需求。
补充资料:演绎推理(见推理)
演绎推理(见推理)
deductive inference
住理。yanyl tullj演绎推理(deduetive infer。二ee)见
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条