导航:首页 > 网络安全 > 网络安全法翻译成英语

网络安全法翻译成英语

发布时间:2022-08-19 06:56:29

A. 所以我们要维护网络安全文明上网用英语翻译

所以我们要维护网络安全文明上网
So we should protect the network from danger and be civilized online

B. 关于网络安全 防火墙的外文翻译 200分

网络防火墙

NETWORK FIREWALLS
The purpose of a network firewall is to provide a shell around the network which will protect the systems connected to the network from various threats. The types of threats a firewall can protect against include:
● Unauthorized access to network resources—an intruder may break into a host on the network and gain unauthorized access to files.
● Denial of service—an indivial from outside of the network could, for example, send thousands of mail messages to a host on the net in an attempt to fill available disk space or load the network links.
● Masquerading—electronic mail appearing to have originated from one indivial could have been forged by another with the intent to embarrass or cause harm.
A firewall can rece risks to network systems by filtering out inherently insecure network services. Network File System (NFS) services, for example, could be prevented from being used from outside of a network by blocking all NFS traffic to or from the network. This protects the indivial hosts while still allowing the service, which is useful in a LAN environment, on the internal network. One way to avoid the problems associated with network computing would be to completely disconnect an organization’s internal network from any other external system. This, of course, is not the preferred method. Instead what is needed is a way to filter access to the network while still allowing users access to the “outside world”.
In this configuration, the internal network is separated from external networks by a firewall gateway. A gateway is normally used to perform relay services between two networks. In the case of a firewall gateway, it also provides a filtering service which limits the types of information that can be passed to or from hosts located on the internal network. There are three basic techniques used for firewalls: packet filtering, circuit gateway, and application gateways. Often, more than one of these is used to provide the complete firewall service.
There are several configuration schemes of firewall in the practical application of inter-network security. They usually use the following terminologies:
● Screening router—it can be a commercial router or a host—based router with some kind of packet filtering capability.
● Bastion host—it is a system identified by the firewall administrator as a critical strong point in the network security.
● Dual—homed gateway—some firewalls are implemented without a screening router, by placing a system on both the private network and the Internet, and disabling TCP/IP forwarding.
● Screened�host gateway—it is possibly the most common firewall configuration. This is implemented using a screening router and a bastion host.
● Screened subnet—an isolated subnet is situated between the Internet and the private network. Typically, this network is isolated using screening routers, which may implement varying levels of filtering.
● Application—level gateway—it is also called a proxy gateway and usually operates at a user level rather than the lower protocol level common to the other firewall techniques.

C. 求翻译~英文摘要~关于网络信息安全的

Since twentieth Century, the rapid development of computer technology, especially the rapid development of Internet technology, has put the whole world even as a whole, so that the social development is inseparable from the information network. It constantly changing economic, social, cultural structure and operation mode, and the transmission of information relating to financial, science ecation, military and other fields, in to the people and the country brings convenient, efficient information sharing at the same time, but also to the security of network information has brought many problems. In today's international competitive situation, the network information security is more and more attention from all over the world. This article from the network information security problems and characteristics, the main techniques of network security, common network attack methods and countermeasures, the construction of network security and other aspects of the present stage of our country network information security problems and restricting factors and how from technology and management and other aspects the construction has the Chinese characteristic information security comprehensive security system, ensure our country network information security.
Key word
The network information security of network attack network ethics network security comprehensive security system

D. 最安全的译为英语是什么

最安全
网络释义
最安全:safest

E. 高分啊~!急! 关于网络安全的英文翻译

国际标准化组织(简写为ISO)开放互连系统(简写为OSI)访问模型定义了七个层次的通信类型和它们之间的

接口(见图1). 每一层取决于它下面一层所提供的服务,一直延伸到物理网络硬件,如计算机的网卡、以及

把这些卡连接在一起的线路.

简单地看这个模型的方法是把它和我们日常使用的东西:电话作比较.为了让你和我在听力所及范围之外交

谈,我们需要一个类似电话的装置.(在ISO/OSI模型,这位于应用层). 电话,只有在它们能把声音转换成电

子脉冲听通过线路来回传送时才有用.(这种功能是由应用层以下提供). 最后,我们着手物质的连接:两者

必须嵌入一个出口,它连接到电话系统的网络交换机中的一个转换器.

如果我给你打电话,我拿起接收器、拨你的号码.这个号码指定了哪个中央交换器来发送我的请求,然后,那

个中央转换器拨通哪个电话.一旦你接电话,我们开始交谈,我们的对话已经开始.从概念上说,计算机网络

的功能跟这一模一样.

你没有必要背诵ISO/OSI访问模型的层次;但知道它们的存在并且没有下面一层提供的服务每一层将无法工

作是有用的.

什么是一些热门的网络?

过去25多年来,一批网络和网络协议已被确定和使用.要去看看其中的两个网络,两者都是公共网络.任何人

都可以连接到这两个网络之一,或者他们可以使用各种网络类型把连接自己的主机(计算机)连接到一起,

而无需连接到公共网络.每种类型采取很不相同的方式提供网络服务.

uucp
uucp(UNIX系统至UNIX系统的复制)原是为连接UNIX系统主机研制(惊讶!).uucp从此被转化成很多不同的体

系结构,包括个人电脑、互助、amigas,苹果,视频调制系统等一切你能命名的和甚至有些你不能命名的.此

外,一些系统已经开发了类似于uucp的原理的.

F. 网络安全法实施用英文怎么

上有政策,下有对策.《网络安全法》实施确实给游戏工作室带来了一定的压力. 如果全手动的话,1:利润降低,2:好员工很难找到.所以还是要辅助的.问题不大,放心的进行你的事业吧.

G. 请教下网络安全用英文怎么翻译

Network Security

H. 用英文,“中国网警”用英语怎么说

正确说法: China's cyber cops

I. 谁帮我翻译一下网络安全的专业英语成中文的,在此先谢谢了。

1.BitLocker 的作用 a.prevent 在借由结合两主要的数据-保护的程序 b 遗失或偷计算机之上的未经认可的接触数据。编加密码整个的窗口作业系统在硬盘 c 上的体积。查证正直早的长靴成份和长靴结构数据 2.窗口 2003 伺候器中,每个人组的变化 1>.不再有完全的控制一。预先设定地,这每个人小组只有读而且运行在每驾驶 b 的根方面的许可。这些许可不是被次文件夹遗传的;这每个人小组有没有许可预先设定地对一个崭新产生的文件夹或文件 2>.不再包括作者不详的使用者仅仅包括使用者和客人 3>.帐户用无效力的密码是控制台-范围 3.窗口 2003 伺候器中, EFS 的变化 EFS 新特征 (在窗口伺候器 2003 和 Windows XP 专业版)一。另外使用者能被授权存取密码化的文件 b 。证书能为废止状态被检查当编加密码文件被分享。(只有当一个使用者被增加一个密码化的文件时,废止被检查) c。脱机文件可能是密码化的 d 。先进的密码技术标准 (AES)和 DES(3D立体)密码技术运算法则是被支援的 e。假设值是 AES-256-一点点的密码技术 f 。密码化的文件使用 WebDav g 能在网络文件夹被储存。EFS 能被窗口伺候器 2003 用聚集 h。文件恢复政策能与较棒的柔性 4 一起配置。PSSU 的作用 1>.后装备安全更新是一个出现一位管理人在新伺候器之上伐木而且为你提供联编的第一次,应用更新到你的伺候器而且配置自动的更新 2 的使用者接口>.后装备安全更新被设计帮助使一个新伺候器安装免于伺候器首先从窗口更新 5 被连接到最近的安全更新的网络和申请的时间之间的传染的危险。什么是 DEP,作用,如何实现 1>.DEP 是一系列硬件,而且运行在记忆上的另外检查帮助保护对抗怀恶意的密码的软件技术开发 2>.硬件运行的 DEP 在一个程序中为所有记忆位置作标记如非可运行的,除非位置明确地包含可运行的密码

阅读全文

与网络安全法翻译成英语相关的资料

热点内容
美术网络授课软件 浏览:205
网络安全三个基本 浏览:709
咸阳移动网络电话收费 浏览:885
内蒙网络教育如何报名 浏览:633
设置还原网络会怎样 浏览:624
ctf网络安全大赛中国 浏览:24
网络连接受限WiFi 浏览:745
手机可以控制宽带网络吗 浏览:465
本地网络营销价格 浏览:821
网络重制后连不上wifi 浏览:933
浩辰cad网络版和单机版有什么区别 浏览:628
oppoa53手机网络连接不上怎么办 浏览:131
wifi放大器扩展成功但无网络 浏览:410
手机如何打开滑盖网络 浏览:464
武功县移动网络电视 浏览:230
网络连接自动掉线是什么原因 浏览:132
多节点什么网络取得基础性胜利 浏览:259
tcl网络电视如何设置会员 浏览:786
集成电脑怎样连无线网络 浏览:53
多台电脑网络布线 浏览:821

友情链接