纵深防御

zònɡ shēn fánɡ yù
  • defense in depth
纵深防御纵深防御
  1. 现在NRC关于纵深防御的策略,很明显是所有的电站设计的第一个,这样就能防止事故的发生。

    Now the strategy of the NRC in term of defense in depth is obviously first of all design the plant such that accidents are prevented .

  2. 网络纵深防御是实现信息保障的核心策略,入侵防护系统是当前实现网络纵深防御的主要技术。

    Defense in depth ( DiD ) is a key policy for information assurance , and intrusion prevention systems are the main techniques to implement it .

  3. 分析了PPDR自适应网络安全模型的不足,提出了一种新的基于主动防御的网络安全模型RPPDRA,在此基础上设计了一个联动的、纵深防御的网络安全解决方案。

    The article analyzed the deficiency of PPDR adaptive network security model , proposed a kind of new security model RPP - DRA based on active defense , designed the network security solutions of linkage , deep defense on this basis .

  4. 人因事故纵深防御系统模型

    Defense - in - Depth for Preventing Human - Initiated Accident

  5. 网络纵深防御方法的研究与实践

    A Study and Implementation of Deep Defense Method for Networks

  6. 企业网络纵深防御体系

    Deep and multiplayer defence system of enterprise networks

  7. 除了这个标准,他们也还有,纵深防御的概念。

    In addition to this criteria they have the concept of Defense in Depth .

  8. 网络纵深防御与入侵防护系统

    Network Defense in Depth and Intrusion Prevention System

  9. 同时我们提出了纵深防御的思想,并将其应用到管控一体化网络的每一方面。

    Also in some part , we give you a new concept of Network Defence from all aspects .

  10. 并通过铁道部网络安全工程的成功案例,展现在纵深防御体系基础上实现的网络访问控制功能。

    It was also showed the resource access control function based on the defense-in-depth structure by the successful cases .

  11. 本文研究了实施信息保障两项技术措施:纵深防御和安全保健。

    This thesis researches two technology measures of appling information assurance , they are Defense-in-Depth and Security Health Care .

  12. 纵深防御战略源自君士坦丁大帝的军事改革,成为拜占庭帝国基本的军事战略。

    Defense-in-depth strategy from the military reforms of Constantine the Great , which is basic military strategy of the Byzantine Empire .

  13. 通过构建成多层纵深防御体系,形成对系统的全方位、多层次的立体防护。

    By building into a multi-layer defense system in depth , this platform forms a system of comprehensive , multi-layered three-dimensional protection .

  14. 然后论述了计算机信息系统纵深防御与保障体系的体系结构,并对组成该体系的各子系统的功能与组成进行了阐述;

    Then , the defense-in-depth and assurance framework of computer information systems is presented , and the functions and subsystems are described .

  15. 从核安全纵深防御的角度,为了再多增加一道安全屏障,设置了二次安全壳。

    In order to add an additional protection from the view point of nuclear safety defence in depth , the secondary containment is adopted .

  16. 他们建议公司采取所谓的纵深防御方法,用不同层次的技术,授权安全专家来监视系统中的不寻常行为。

    They recommend companies take what is called a defense in depth approach , layering different technologies and empowering security professionals to monitor systems for unusual behavior .

  17. 他们建议公司采取所谓的“纵深防御”方法,用不同层次的技术,授权安全专家来监视系统中的不寻常行为。

    They recommend companies take what is called a " defense in depth " approach , layering different technologies and empowering security professionals to monitor systems for unusual behavior .

  18. 基于主动防御的思想对传统的PDRR安全模型进行了扩充,提出了一种网络主动防御安全模型和纵深防御安全策略,并在此基础上提出了一种网络主动防御体系结构。

    Based on the thought of active defense , this paper proposed a network active defensive security model and a defense-in-depth security policy , and then presented a network defensive architecture .

  19. 纵深防御的基本思想是利用尽可能多的防护手段来保护资源,在影响信息安全的多个操作环节及其支撑技术上实施保障。

    Defense-in-Depth 's base idea is to make usage of as many as possible defending measures to protect resource , apply assurance in multiple operation taches and support technologies that affect information security .

  20. 对该系统中人因事故的防范采取基于多米诺骨牌原理的策略可能已无效,而需采用技术手段、组织手段、文化手段溶为一体的纵深防御策略。

    It maybe of no effect to take strategy of Domino Principle to prevent human-initiated accidents in the system , take strategy of defence-in - depth with technical , organizational and culture approach .

  21. 本方案通过网络层次、安全域的合理划分,在支撑性基础设施、网络边界和局域网运行环境下对攻击进行了纵深防御。

    Through the reasonable partition in the network layers and security domain , this scheme provides depth defense to attack in the aspects of supporting infrastructure , network border and LAN running environment .

  22. 认为网络信息安全人因失误分析应从人因失误行为及其影响因素、定性定量评价、人因失误事件纵深防御系统4个方面来进行。

    The human error analysis of the network information security covers the human error behavior and its influencing factors , the qualitative and quantitative analyses of error behavior as well as the management system for human error affairs .

  23. 本论文以作者的实际工作为基础,从理论原理和技术方法以及具体实现三个层面,重点论述了构建一个网络安全纵深防御系统的方法研究和方案设计。

    This paper based on three layers of theories rules , technology method and concrete realization , A kind of method research and solutions design of is discussed in detail on how to instruct a system of Defense in Depth .

  24. 企业网络需要一种纵深的防御体系。

    Enterprise networks need a kind of deep and multiplayer defence system .

  25. 指挥部命令对机场地区做额外的侦察,怕那儿有仔细隐藏的伊军单位和纵深的防御。

    The command ordered additional reconnaissance to be done in the airport area fearing there may carefully concealed Iraqi units and extensive defenses .

  26. 作为一种实时的主动防御系统,入侵检测系统可以安装在网络任意的节点上,选择不同的安放位置可适应不同的网络结构,从而可以形成一个立体纵深的防御系统。

    As a real-time active defense system , the IDS can be installed on any node in the network . Different placement can be adapted to the different network structures , which can form a three-dimensional depth of the defense system .

  27. 以上三种雷达配合使用,就可以形成大范围纵深的立体防御系统。

    So , it can form a wide range of in-depth three-dimensional defense system by the conjunction of three types radar in above .