Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.
测试访问将帮助您查明一名未授权用户是否能够成功访问一个只有管理员有权使用的控件。
It may be necessary to secure event payloads from unauthorized access using access control.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?
访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?
Discretionary access control (DAC) is the kernel of most protection mechanism, and the research on safety of DAC concerns whether rights can be leaked to unauthorized subjects.
自由访问控制(DAC)是大多数操作系统保护机制的核心,DAC的安全性研究关注对象的权限是否被泄漏给未授权主体。
Access controls prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect company assets.
访问控制,防止未经授权进入的设施,保持员工和旅客的控制,保护公司资产。
This paper introduces commonly used methods of ID Authentication in a campus network and finds a common problem that it is difficult to control access unauthorized within the broadcast domain.
介绍了常见的园区网用户身份认证方法,并指出它们普遍存在的一个问题:在一个广播域内非法接入难以控制。
Multilevel security requires additional mechanisms for enforcing mandatory access control that prevents the establishment of a signaling channel and prevents unauthorized disclosure of information.
多级安全能实施强制性访问控制,从而杜绝信息通道的产生,有效地阻止信息的非法泄露。
To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.
为保护用户数据、系统资源不被非法访问和滥用,现代文件系统设立了文件访问控制、数据加密等各种安全机制。
Access control is an important technology that is used to protect system resources from unauthorized user access, change, destruction.
访问控制是用来保护系统资源免于被非法用户访问、更改、破坏的一项重要技术。
Access control is an important technology that is used to protect system resources from unauthorized user access, change, destruction.
访问控制是用来保护系统资源免于被非法用户访问、更改、破坏的一项重要技术。
应用推荐