关注加固数字墙的缺点是一旦他们被绕过,攻击者就已获得了所有受保护的数据。
The shortcoming in focusing on such sturdy digital walls is that once they are evaded, the attacker has access to all the protected data behind them.
Jackson说,人们考虑过被数据跟踪的事,并考虑过保护个人信息不被网上营销公司侵犯,虽然这些公司本质上自己也没有任何防御措施。
People concerned about data tracking and protecting their personal data from being poached by online marketing firms are essentially defenseless as well, Jackson says.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
这可以保证数据在存储后,或者未经修改返回,或者被标识为“可疑”—非常类似于受保护的HDD。
This ensures that, once stored, data is either returned unmodified, or is identified as being "suspect" - much like data on HDDs is safeguarded.
简单地,可恢复的动作是修改被保护数据的任何事情。
For our simple purposes, a recoverable action is anything that modifies protected data.
然而,德国联邦数据保护机构主管彼得·沙尔谈到欧美之间的隔阂被夸大了。
But regulators such as Peter Schaar, who heads Germany's federal data-protection agency, say the gulf is exaggerated.
事实上,这架直升机只受到了很小的损伤,它已经被修复并准备进行重复测试——但是,这次测试是没有缓冲器保护的——这是为了获得用来做比较的数据。
In fact, the helicopter was so lightly damaged that it is being repaired so that the test can be repeated-but this time without the cushion-to obtain comparable data.
通过清理数据并忽略被错误提交的数据,已经为保护应用程序奠定了良好的基础。
By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.
LotusScript被设计为线程安全的,这意味着它使用信号量保护数据结构,从而保护装载的每个LotusScript实例。
LotusScript is designed to be thread-safe, which means it USES semaphores to protect data structures so that each loaded instance of LotusScript is protected.
完善的安全功能能够保护APIs避免被滥用,并确保用户数据隐私。
Sophisticated security capabilities to help protect the APIs from abuse and ensure the privacy of customer data.
为了确保实现HeadlessExecution,同时防止. properties文件中的数据被窥探,我使用的技巧是将这些文件签入到一个受保护的储存库中。
A technique I've used to ensure Headless Execution while protecting the data in the.properties files from prying eyes is to check these files into a protected repository.
但19世纪的捕猎使其大部分被毁灭,据国际自然保护联盟(IUCN)的数据,仅19世纪40年代被屠宰的露脊鲸就多达3万只。
But hunting in the 19th century wiped out most of them, with up to30, 000 slaughtered in the 1840s alone, according to the InternationalUnion for the Conservation of Nature (IUCN).
这有助于在传输过程中保护备份数据,它意味着存储在TivoliStorageManager服务器上的数据已加密,因而不能被恶意管理员所读取。
This helps secure backed-up data during transmission, and it means that the data stored on the Tivoli Storage Manager server is encrypted and thus is unreadable by any malicious administrators.
因为ZFS从不覆盖数据而是写入到新的位置,所以可以保护较早的数据(但是在不重要的情况下被标记为删除以逆转磁盘空间)。
Because ZFS never overwrites data but instead writes to a new location, older data can be preserved (but in the nominal case is marked for removal to converse disk space).
存储在计算机里的数据能被保护起来。
又包括内部审计的管理目标—即不仅包括被审计IS保护资产安全及数据完整,且包括IS的有效性目标。
It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.
如今指挥仪测量的数据被传送到甲板下受保护的绘图室内的计算器。
Today the quantities measured at the director are sent to the computer in a protected plotting room below decks.
免于作为完整的数据保护,用户盗窃威胁被滥用的保障。
Frees the User from the Threat of Theft as Full Protection of Data from being Misused is guaranteed.
可以在以后再次散列该数据并与被保护的值进行比较。
At a later time, the data can be hashed again and compared to the protected value.
保护您的隐私被触发远程擦除手机上删除所有的私人数据。
Protect your privacy by triggering a remote wipe to delete all private data on your phone.
在资源传送时,有可能会使用某些加密方式来保护你的资源。当数据被客户端控制的时候则有可能找到某种方法从数据内容中掘取某些资源。
Whilst it is possible to use encryption to secure your Assets as they are being transmitted, once the data is in the hands of the client it is possible to find ways to grab the content from them.
即便你的数据受到密码保护,某个进入你电脑的人还是“可以看到你的所有文件,如果它们没有被加密的话”。
Even if your data were password protected, someone who gained access to your computer "would have access to all your files if they were unencrypted. ""
数字水印技术通过向被保护的多媒体数据中加入透明的秘密信息,来达到标识、鉴别、控制或隐藏信息等作用。
Digital watermarking techniques can be used for purposes such as label, authentication, control and dada hiding etc, by embedding a secret imperceptible signal directly into the data to be protected.
这样有助于保护宿主环境中的应用程序,避免其站点地图数据被另一应用程序加载。
This helps protect applications in a hosted environment from having their site-map data loaded by another application.
另外,硬件虚存机制可以对内存部分区域提供写保护,以防止代码和数据被其它恶意的应用程序所篡改。
Also, the hardware virtual memory mechanisms allow areas of memory to be protected against writing. This protects code and data from being overwritten by rogue applications.
规定对通过一个输入端口传送的良好数据流被保护,避免受到通过该数据交换节点的其它输入端口传送的不良数据流所阻挡。
Provisions are made for well-behaved data flows conveyed via an input port to be protected against blocking from misbehaving data flows conveyed via other input ports of the data switching node.
没有被完全记录的那个事务不能被滚回,为保护数据库完整性,操作系统结束该事务并将它自动滚回。
A transaction that is not fully recorded cannot be rolled back. To preserve database integrity, the operating system ended the transaction and rolled it back automatically.
数据保护公司AcronisInc 2013年7月份的一项调查显示,21%的公司会在员工辞职或者被解雇时进行远程清除。
Twenty-one percent of companies perform remote wipes when an employee quits or is terminated, according to a July 2013 survey by data protection firm Acronis Inc.
为了防止静止数据被不法人士存取、窃取或修改,通常采取一些安全措施,如数据加密和分等级的口令保护。
In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.
为了防止静止数据被不法人士存取、窃取或修改,通常采取一些安全措施,如数据加密和分等级的口令保护。
In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.
应用推荐