攻击者利用网络技术,非法入侵他人计算机系统,窃取信息、篡改数据,给企业造成巨大损失。
Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.
科技论文中存在剽窃、抄袭、伪造或篡改数据、挂名、一稿多投、捉刀代笔等学术道德失范现象。
There exists in scientific thesis the phenomenon of academic moral decline such as plagiarism, copy, forging, juggling the data, nominal, multi-submission, ghostwriting etc.
最后三种学术不端行为是:剽窃、捏造和篡改数据。美国国家科学基金把它们列为学术不端的鉴戒。
The final three types of unethical behavior, plagiarism, fabrication and falsification, are listed by the US National Science Foundation as definitive examples of scientific misconduct.
在网络上传输的数据容易受到各种网络攻击,例如嗅探网络传输、不可抵赖性、篡改数据、欺骗、拦截和捕捉回复。
The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.
安全意识很强的开发人员甚至不信任他们自己的数据库,理由是他们认为恶意用户可能有办法篡改数据库。
The most security-conscious developers distrust even their own databases, on the theory that a malicious user might have found a way to tamper with the database.
日本第六大小轿车制造商三菱汽车承认,其雇员已在某些车型的燃油消耗测试中篡改数据,使之能虚报里程数。
Mitsubishi Motors, Japan's sixth-largest carmaker, admitted that its employees had altered data in fuel-consumption tests for some of its models so that they would record better mileage.
审计员们一般都会让董事们过关,因为如果抗议公司篡改数据,他们马上就会被那些不会对实际经济状况挑刺的人替代。
Auditors tend to let directors get away with murder, for if they protest at creative accounting the firm is promptly sacked in favor of a substitute that will not jib at economy with the facts.
数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
未能防止不经授权访问或更改数据,未能提供有效的控制措施防止数据被篡改及数据丢失。
Failure to prevent unauthorized access or changes to data, and to provide adequate controls to prevent manipulation and omission of data.
未能防止不经授权访问或更改数据,未能提供有效的控制措施防止数据被篡改及数据丢失。
Failure to prevent unauthorized access or changes to data, and to provide adequate controls to prevent manipulation and omission of data.
应用推荐