• Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    youdao

  • For example, the attack from the network is the main threat of security, while the network attack uses all kinds of technique and means with the purpose of using the leak of the system.

    其中网络攻击最主要安全威胁。网络攻击的各种技术方法,都是企图利用系统漏洞

    youdao

  • Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.

    通道一种违背系统安全策略的方式泄露秘密信息系统安全造成很大威胁。

    youdao

  • Avon Park has Changping's complete and comprehensive property management, intelligent gas leak, smoke alarms, infrared security system and so on.

    拥有常平完善周全物业管理智能煤气防漏烟雾警报红外线防盗系统

    youdao

  • Avon Park has Changping's complete and comprehensive property management, intelligent gas leak, smoke alarms, infrared security system and so on.

    拥有常平完善周全物业管理智能煤气防漏烟雾警报红外线防盗系统

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定