网络安全评估

  • 网络network security assessment;Assessing network security
网络安全评估网络安全评估
  1. 我还安装了一些跟网络安全评估有关的有趣软件。

    Some interesting programs installed include those related to network security assessment .

  2. 受危险理论启发的网络安全评估方法

    The danger theory inspired approach to network security assessment

  3. 大型活动拥挤踩踏事故BP神经网络安全评估方法应用分析

    Application of BP Neural Networks Assessment Method in the Stampede Accidents of Large-scale Activities

  4. 委员会还表达了对华为运营的网络安全评估中心(CybersecurityEvaluationCentre)的担忧。

    The committee also raised concerns about Huawei-run Cybersecurity Evaluation Centre ─

  5. FNSEM:基于FCM的网络安全评估模型

    Network Security Evaluation Model Based on FCM

  6. 然后,具体介绍了活动主机发现模块、活动端口及服务发现模块、路由信息发现模块、OS类型发现模块和网络安全评估模块。

    Last the paper introduces in detail about modules of active hosts discovery , opening ports and services discovery , route information discovery , OS version discovery and vulnerability evaluation .

  7. 2010年,华为在英国班伯里(Banbury)建立了一个网络安全评估中心,负责分解并剖析在英国使用的硬件设备和软件,以缓解对国家安全构成的风险。

    A cyber security evaluation centre in Banbury was established in 2010 by Huawei to take apart the physical equipment and software used in the UK to mitigate risks to national security .

  8. 本文也分析了网络安全评估的主要几种模型。

    The thesis also analyzes the main models of network security .

  9. 基于攻击图模型的网络安全评估研究

    Study of network security evaluation based on attack graph model

  10. 基于弱点关联和安全需求的网络安全评估方法

    Network security evaluation based on vulnerability correlation and security requirements

  11. 基于信息探测的网络安全评估系统

    The System of Network Security Evaluation Based on Information Detected

  12. 一个基于不确定性推理的网络安全评估模型

    A Network Security Evaluation Model Based on Uncertainty Reasoning

  13. 一种新型网络安全评估系统研究

    Research on a New Network Security Assessment System

  14. 网络安全评估所涉及的关键技术与原理

    Key Technology & Principle of Net-safety 's Assessment

  15. 基于关系数据库策略驱动的网络安全评估系统

    Network Security Evaluation System Based on Relational Database

  16. 基于信息融合的网络安全评估方法研究

    Network Security Evaluation Method Research on Information Fusion

  17. 网络安全评估软件综述

    An Overview of Network Security Assessment Software

  18. 测试了网络安全评估系统己实现的功能模块。

    The tests on the functions of the available modules for network security risk system are made in this paper .

  19. 网络安全评估指标是网络安全评估的工具,是反映电信网安全属性的标志。

    The index of network security evaluation is used to evaluate network security and indicate the security property of telecom network .

  20. 网络安全评估能够检测到网络系统的安全漏洞以及在系统中存在的威胁,并评估网络系统的安全状况,是网络安全主动防御中的一项重要技术,对网络安全技术的研究具有重要意义。

    Network security assessment could detect the security vulnerability and the threat in network , and assess the security of network systems .

  21. 提出了一个基于威胁评估和模拟攻击的安全风险评估模型,设计并实现了网络安全评估原型系统。

    A risk assessment model based on threat assessment and simulation attack is proposed , and a kind of prototype system is designed and realized .

  22. 网络安全评估的难点在于如何选择和分析各种影响网络安全的因素及其属性。

    The difficulty of network security evaluation is how to select and analyze the factors and their attributes , which are highly important to network security .

  23. 涵盖各个领域的量化分析结合在一起使得基于贝叶斯网权限图的网络安全评估方法更加准确、精确,更加能够适应动态变化的网络。

    The combination of analysis covering different kinds of knowledge makes the network security assessment more accurate , more precise and suits to the changes of networks .

  24. 网络安全评估提供了一种实现主动防御的重要手段,现正成为信息安全保障体系建设中的基础性工作和重要环节。

    Network Security Assessment provides an important way to achieve active defense and is now becoming the basic work and the important part of information security system construction .

  25. 基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。

    According to the key techniques above , the paper designs system of network security evaluation based on information detection in chapter 3 , and supplies method for the system realization .

  26. 以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。

    A computer network vulnerability evaluation system is designed based on attack graph modeling method . The computer network security evaluation tools and model check tools are integrated in the system .

  27. 然而,现有的漏洞检测工具漏洞库相互之间信息共享较差,且支持操作系统单一、兼容性差,并且网络安全评估未考虑漏洞之间的关联关系,对网络安全的防护工作难以起到有效的指导作用。

    However , for the existing vulnerability detection tools , the vulnerability information sharing among different vulnerability databases is poor . These tools support single type of operating system and have poor compatibility .

  28. 网络安全评估也就是网络风险评估,是对网络信息和网络信息处理设施所面对的威胁、响应的影响和脆弱性及三者发生的可能性的评估。

    Network security assessment , which is also called network risk assessment , aims to give an analysis to the vulnerability and impact when information technology infrastructure needs to make a response or faces threat .

  29. 在网络安全评估系统中,在得到了目标网络的漏洞信息之后,采用何种算法对目标网络的安全性能进行评估显得尤为重要。

    In the system of network security assessment , after receiving the vulnerabilities information of the goal network , we adopt which kind of algorithm to assess security performance of the goal network seems particularly important .

  30. 网络安全评估并不是一个新的概念,它最早可追溯到1985年美国国防部发布的可信计算机系统评价准则。

    Network security assessment is not a new concept . It can date back to the year 1985 , when the United States Department of Defense issued the first evaluation criteria – Trusted Computer System Evaluation Criteria .