正在加载图片...
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.1入侵计算机的特点 Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed 最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不 可能是最常用的,也不可能是针对己经釆取了最可靠的防范措施的方法。 This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are 这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强 了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻 击的方法是什么。和解 10-5Chapter 10 Computer and Network Security 计算机专业英语 10-5 10.1.1 入侵计算机的特点 Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed. 最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不 可能是最常用的,也不可能是针对已经采取了最可靠的防范措施的方法。 This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are. 这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强 了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻 击的方法是什么。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有