正在加载图片...
Threat Monitoring(威胁监控) Check for suspicious patterns of activity -i.e. several incorrect password attempts may signal password guessing.(检査可疑的 行动模式:例如,多次错误的密码尝试可能表示有人在猜密码) Audit log -records the time, user, and type of all accesses to an object; useful for recovery from a violation and developing better security measures.(审计日志:记录所有对象访问的时间、用户 以及类型;对于受损后的恢复以及开发更好的安全措施有用) Scan the system periodically for security holes; done when the computer is relatively unused.(定期扫描系统安全漏洞;系统不 用的时候关闭) Applied Operating System Concepts Silberschatz, Galvin, and Gagne @199919.7 Silberschatz, Galvin, and Gagne ©1999 Applied Operating System Concepts Threat Monitoring(威胁监控) • Check for suspicious patterns of activity – i.e., several incorrect password attempts may signal password guessing.(检查可疑的 行动模式:例如,多次错误的密码尝试可能表示有人在猜密码) • Audit log – records the time, user, and type of all accesses to an object; useful for recovery from a violation and developing better security measures.(审计日志:记录所有对象访问的时间、用户 、以及类型;对于受损后的恢复以及开发更好的安全措施有用) • Scan the system periodically for security holes; done when the computer is relatively unused.(定期扫描系统安全漏洞;系统不 用的时候关闭)
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有