Defense in-depth is all about having redundant security measures in place — not only encryption but also smart handling of user-supplied data.
深层防御是将多余的安全方法都妥善保管——不仅包括加密,还包括用户所提供数据的智能处理。
Part 10 of this article series discussed how you can use defense in depth to protect your SOAs.
本系列文章的第10部分讨论了可以如何使用深度防御来保护您的SOA。
As with anything else, defense in depth is a balance between security and utility.
和任何事情一样,深度防御也是安全性和适用性之间的平衡。
Offers greater levels of data protection through defense in depth.
通过深度防御来提供更高级别的数据保护。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
The idea behind defense in depth is simple: Never rely on just one security method.
深度防御背后的理念很简单:永远不要仅依赖于一种安全方法。
We believe that the only viable strategy for authenticating users is to apply the defense in depth principle, mixing a number of authentication techniques.
我们相信用于认证用户的唯一可行的策略是以深度原则应用防御,混合多种认证技术。
To show how the defense in depth works, we will first examine a centric model of three primary layers: core, middle, and outermost.
为了演示深度防御的工作原理,我们将首先研究包含三个主要层次的中心模型:核心层、中间层和最外层。
Good security provides defense in depth; using more than one approach is not necessarily a bad thing.
良好的安全性可提供深度防御;使用多种方法并不一定是坏事。
To improve security, it's often wise to use more than one method of protection (also called "defense in depth").
要提高安全性,明智的做法是使用多种保护方法(也称为“深度防御”)。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
It's all meant to provide defense in depth.
这都是为了提供深度的防护。
Now the strategy of the NRC in term of defense in depth is obviously first of all design the plant such that accidents are prevented.
现在NRC关于纵深防御的策略,很明显是所有的电站设计的第一个,这样就能防止事故的发生。
What are some tangible examples of defense in depth?
深度防御的具体例子有哪些?
It is quite possible to treat a defense in depth framework as the orchestrator of the smaller defense in depth players due to the global nature of an organization.
很有可能由于组织的全球特性而将深度防御框架作为更小的深度防御组件的协调机构对待。
This defense-in-depth model begins with technologies as the foundation using the following examples
此深度防御模型使用以下示例作为技术基础
In addition to this criteria they have the concept of Defense in Depth.
除了这个标准,他们也还有,纵深防御的概念。
External attackers are those who must traverse your "defense in depth" to try and break into your systems.
外部攻击者是那些必须透过您的“深度防御”试图闯入您系统的人。
You need more than defense in depth.
您不仅只需要深度防御。
These are procedural steps following the "Depth in Defense" approach.
这是承接“纵深防御”的程序。
When it comes to safety, the nuclear industry emphasizes the concept of "defense in depth."
谈到安全问题,核工业界强调“纵深防御”的概念。
Defense-in-depth must be considered early in the design phase of the development process, and must be an integral consideration in all technical decision-making associated with the network.
防御纵深必须考虑早在开发过程的设计阶段,必须在所有的技术决策不可或缺的考虑因素与网络相关。
This paper first proposes one inner-net information defense system based on the depth defense and elaborates in detail the system composition structure and each module function.
提出一个基于深度防御思想的内网信息防御系统,阐述系统组成结构和各作用模块的作用。
Intrusion detection and prevention systems have become an essential technology in the deployment of a "defense-in-depth" security architecture.
入侵检测和防护系统已经成为部署“深度防护”安全体系结构的一种基本技术。
Proposes an IPS model based on defense-in-depth theory.
然后提出一种基于深度防御原则的深度入侵防御系统模型。
Thus, network defense-in-depth is imperative.
因此,网络纵深防御,势在必行。
To calculate the fire frequency of coordinate air defense in feet, a calculation model restrained by kill zone depth, course shortcut and interval length between ships is presented.
为解决舰艇编队协同防空中的射击次数计算问题,提出了受杀伤区纵深、航路捷径和舰艇间隔距离约束的计算模型。
To calculate the fire frequency of coordinate air defense in feet, a calculation model restrained by kill zone depth, course shortcut and interval length between ships is presented.
为解决舰艇编队协同防空中的射击次数计算问题,提出了受杀伤区纵深、航路捷径和舰艇间隔距离约束的计算模型。
应用推荐