A. 所以我們要維護網路安全文明上網用英語翻譯
所以我們要維護網路安全文明上網
So we should protect the network from danger and be civilized online
B. 關於網路安全 防火牆的外文翻譯 200分
網路防火牆
NETWORK FIREWALLS
The purpose of a network firewall is to provide a shell around the network which will protect the systems connected to the network from various threats. The types of threats a firewall can protect against include:
● Unauthorized access to network resources—an intruder may break into a host on the network and gain unauthorized access to files.
● Denial of service—an indivial from outside of the network could, for example, send thousands of mail messages to a host on the net in an attempt to fill available disk space or load the network links.
● Masquerading—electronic mail appearing to have originated from one indivial could have been forged by another with the intent to embarrass or cause harm.
A firewall can rece risks to network systems by filtering out inherently insecure network services. Network File System (NFS) services, for example, could be prevented from being used from outside of a network by blocking all NFS traffic to or from the network. This protects the indivial hosts while still allowing the service, which is useful in a LAN environment, on the internal network. One way to avoid the problems associated with network computing would be to completely disconnect an organization』s internal network from any other external system. This, of course, is not the preferred method. Instead what is needed is a way to filter access to the network while still allowing users access to the 「outside world」.
In this configuration, the internal network is separated from external networks by a firewall gateway. A gateway is normally used to perform relay services between two networks. In the case of a firewall gateway, it also provides a filtering service which limits the types of information that can be passed to or from hosts located on the internal network. There are three basic techniques used for firewalls: packet filtering, circuit gateway, and application gateways. Often, more than one of these is used to provide the complete firewall service.
There are several configuration schemes of firewall in the practical application of inter-network security. They usually use the following terminologies:
● Screening router—it can be a commercial router or a host—based router with some kind of packet filtering capability.
● Bastion host—it is a system identified by the firewall administrator as a critical strong point in the network security.
● Dual—homed gateway—some firewalls are implemented without a screening router, by placing a system on both the private network and the Internet, and disabling TCP/IP forwarding.
● Screened�host gateway—it is possibly the most common firewall configuration. This is implemented using a screening router and a bastion host.
● Screened subnet—an isolated subnet is situated between the Internet and the private network. Typically, this network is isolated using screening routers, which may implement varying levels of filtering.
● Application—level gateway—it is also called a proxy gateway and usually operates at a user level rather than the lower protocol level common to the other firewall techniques.
C. 求翻譯~英文摘要~關於網路信息安全的
Since twentieth Century, the rapid development of computer technology, especially the rapid development of Internet technology, has put the whole world even as a whole, so that the social development is inseparable from the information network. It constantly changing economic, social, cultural structure and operation mode, and the transmission of information relating to financial, science ecation, military and other fields, in to the people and the country brings convenient, efficient information sharing at the same time, but also to the security of network information has brought many problems. In today's international competitive situation, the network information security is more and more attention from all over the world. This article from the network information security problems and characteristics, the main techniques of network security, common network attack methods and countermeasures, the construction of network security and other aspects of the present stage of our country network information security problems and restricting factors and how from technology and management and other aspects the construction has the Chinese characteristic information security comprehensive security system, ensure our country network information security.
Key word
The network information security of network attack network ethics network security comprehensive security system
D. 最安全的譯為英語是什麼
最安全
網路釋義
最安全:safest
E. 高分啊~!急! 關於網路安全的英文翻譯
國際標准化組織(簡寫為ISO)開放互連系統(簡寫為OSI)訪問模型定義了七個層次的通信類型和它們之間的
介面(見圖1). 每一層取決於它下面一層所提供的服務,一直延伸到物理網路硬體,如計算機的網卡、以及
把這些卡連接在一起的線路.
簡單地看這個模型的方法是把它和我們日常使用的東西:電話作比較.為了讓你和我在聽力所及范圍之外交
談,我們需要一個類似電話的裝置.(在ISO/OSI模型,這位於應用層). 電話,只有在它們能把聲音轉換成電
子脈沖聽通過線路來回傳送時才有用.(這種功能是由應用層以下提供). 最後,我們著手物質的連接:兩者
必須嵌入一個出口,它連接到電話系統的網路交換機中的一個轉換器.
如果我給你打電話,我拿起接收器、撥你的號碼.這個號碼指定了哪個中央交換器來發送我的請求,然後,那
個中央轉換器撥通哪個電話.一旦你接電話,我們開始交談,我們的對話已經開始.從概念上說,計算機網路
的功能跟這一模一樣.
你沒有必要背誦ISO/OSI訪問模型的層次;但知道它們的存在並且沒有下面一層提供的服務每一層將無法工
作是有用的.
什麼是一些熱門的網路?
過去25多年來,一批網路和網路協議已被確定和使用.要去看看其中的兩個網路,兩者都是公共網路.任何人
都可以連接到這兩個網路之一,或者他們可以使用各種網路類型把連接自己的主機(計算機)連接到一起,
而無需連接到公共網路.每種類型採取很不相同的方式提供網路服務.
uucp
uucp(UNIX系統至UNIX系統的復制)原是為連接UNIX系統主機研製(驚訝!).uucp從此被轉化成很多不同的體
系結構,包括個人電腦、互助、amigas,蘋果,視頻調制系統等一切你能命名的和甚至有些你不能命名的.此
外,一些系統已經開發了類似於uucp的原理的.
F. 網路安全法實施用英文怎麼說
上有政策,下有對策.《網路安全法》實施確實給游戲工作室帶來了一定的壓力. 如果全手動的話,1:利潤降低,2:好員工很難找到.所以還是要輔助的.問題不大,放心的進行你的事業吧.
G. 請教下網路安全用英文怎麼翻譯
Network Security
H. 用英文,「中國網警」用英語怎麼說
正確說法: China's cyber cops
I. 誰幫我翻譯一下網路安全的專業英語成中文的,在此先謝謝了。
1.BitLocker 的作用 a.prevent 在藉由結合兩主要的數據-保護的程序 b 遺失或偷計算機之上的未經認可的接觸數據。編加密碼整個的窗口作業系統在硬碟 c 上的體積。查證正直早的長靴成份和長靴結構數據 2.窗口 2003 伺候器中,每個人組的變化 1>.不再有完全的控制一。預先設定地,這每個人小組只有讀而且運行在每駕駛 b 的根方面的許可。這些許可不是被次文件夾遺傳的;這每個人小組有沒有許可預先設定地對一個嶄新產生的文件夾或文件 2>.不再包括作者不詳的使用者僅僅包括使用者和客人 3>.帳戶用無效力的密碼是控制台-范圍 3.窗口 2003 伺候器中, EFS 的變化 EFS 新特徵 (在窗口伺候器 2003 和 Windows XP 專業版)一。另外使用者能被授權存取密碼化的文件 b 。證書能為廢止狀態被檢查當編加密碼文件被分享。(只有當一個使用者被增加一個密碼化的文件時,廢止被檢查) c。離線文件可能是密碼化的 d 。先進的密碼技術標准 (AES)和 DES(3D立體)密碼技術運演算法則是被支援的 e。假設值是 AES-256-一點點的密碼技術 f 。密碼化的文件使用 WebDav g 能在網路文件夾被儲存。EFS 能被窗口伺候器 2003 用聚集 h。文件恢復政策能與較棒的柔性 4 一起配置。PSSU 的作用 1>.後裝備安全更新是一個出現一位管理人在新伺候器之上伐木而且為你提供聯編的第一次,應用更新到你的伺候器而且配置自動的更新 2 的使用者介面>.後裝備安全更新被設計幫助使一個新伺候器安裝免於伺候器首先從窗口更新 5 被連接到最近的安全更新的網路和申請的時間之間的傳染的危險。什麼是 DEP,作用,如何實現 1>.DEP 是一系列硬體,而且運行在記憶上的另外檢查幫助保護對抗懷惡意的密碼的軟體技術開發 2>.硬體運行的 DEP 在一個程序中為所有記憶位置作標記如非可運行的,除非位置明確地包含可運行的密碼