网络漏洞

网络漏洞网络漏洞
  1. 网络漏洞扫描系统的功能分析与CIM建模

    Function Analysis and CIM Modeling of Network Vulnerability Scanners

  2. 最后本文设计并实现了一个采用木马体系结构的、面向攻击的网络漏洞扫描系统NVS(NetworkVulnerabilityScanner)。

    In the end , this article describes the design and implementation of a network vulnerability scanning system , which names NVS ( Network Vulnerability Scanner ) .

  3. 在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。

    Secondly , the dissertation analyzed and induced network vulnerability scanners ' functions , and presented a CIM model of the scanner .

  4. 本文对基于CIM的管理信息建模方法进行了研究,提出了一个网络漏洞扫描系统的CIM管理信息模型。

    The dissertation studied the management information modeling method based on CIM , then presented a CIM model of network vulnerability scanner .

  5. 目前不能确定黑客是否真的通过HBO的网络漏洞窃取到宝贵资源——该公司最火的电视剧《权游》的待播剧集。

    It 's not clear if the hackers actually have what would be the crown jewel target for an HBO cyber breach - upcoming episodes of the company 's biggest hit , Game of Thrones .

  6. 在模拟黑客攻击模型的基础上,综合采用Windows和Linux平台作为扫描基础平台,采用客户端/服务器架构,利用分布并发机制设计了一个高效网络漏洞扫描系统。

    An effective Network Security Scan system , which based on the simulation to the hacker 's attack activities , and the LINUX and WINDOWS , was deigned . It used the structure of Client / Server and the mechanism of distributed simultaneously to improve the scan speed .

  7. 根据Variety报道,这些消息是HBO旗下的时代华纳有线电视公司主动支付“赎金”作为正义的黑客找到网络漏洞的奖励金。而该电视公司播放的就是《权利的游侠》剧集。

    The message from HBO , the Time Warner Inc cable unit that broadcasts ' Game of Thrones , ' offers the money as part of a program in which ' white-hat professionals ' are rewarded for identifying cyber security flaws , according to Variety .

  8. 例如FireEye公司在年初收购了安全公司Mandiant,后者在探测网络漏洞、追踪和分析黑客方面颇有一套。

    At the beginning of this year , FireEye ( FEYE ) , for example , bought Mandiant , a cybersecurity firm able to investigate network breaches and track and detail hackers .

  9. 网络漏洞扫描方法分为:直接测试、推断、认证测试。

    Hole scanning is divided into directly test , concluding and authentication test .

  10. 网络漏洞扫描技术

    The Study of the Technique for Network Vulnerability Scanning

  11. 一种分布式网络漏洞扫描器系统的设计

    Design of network Vulnerability Scanning Distributed System

  12. 计算机网络漏洞浅析及安全防护

    Computer Network Analysis and Safety Protection

  13. 而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。

    And the function of gathering vulnerability information is often provided by network vulnerability scanning tools .

  14. 本文提出了基于端口扫描和插件的网络漏洞扫描器模型。

    The network vulnerability scanner based on port scanning and plugin is proposed in this article .

  15. 网络漏洞扫描系统是一种自动检测远程目标主机安全漏洞的工具。

    Network vulnerability scanning system is the automatic long-term detection tool to check the mainframe security vulnerabilities procedures .

  16. 网络漏洞扫描器是一个用来自动检查本地或远程主机的安全漏洞的程序。

    The network hole scanner is a program used to checking for security hole in local or remote host .

  17. 特别是零日漏洞攻击的出现,对网络漏洞评估提出了新的要求。

    Some newly found network attacks such as zero-day vulnerability attack have made new demands of network vulnerability assessment .

  18. 重点研究了网络漏洞扫描技术,并从端口扫描、漏洞扫描和字典攻击三个方面进行讨论。

    Then it studies the network vulnerability scanning technology , witch includes port scanning , vulnerability scanning and dictionary attacking .

  19. 最后,作为对网络漏洞扫描技术的补充,简要介绍和讨论了系统脆弱性分析技术。

    Finally , as a complement to the leak scan technology , vulnerability analysis technology is also introduced and discussed briefly in the paper .

  20. 网络漏洞扫描技术则可以通过实时的扫描以及时发现系统存在漏洞,进而对其进行修补完善,防患于未然。

    Network vulnerability scanning technology can found system vulnerability through the real-time scanning , and then repair it , which could make us take preventive measures .

  21. 网络漏洞扫描技术利用最新的网络安全技术以及时取得网络系统安全状况的最新信息,防止重大安全隐患的发生。

    With the development of Internet , the research on Network Security Technology has made rapid progress , among which network vulnerability scanning is the key ones .

  22. 堵塞网络漏洞,完善法制,加强网络管理,营造良好的网络环境是预防青少年网络犯罪的有效措施;

    It is the effective action to perfect legal system , strengthens the network management and build the good network environment to prevents the young people network crime ;

  23. 自从网络漏洞问题出现后,希望以此来刷新这家芬兰公司多少有点老化的产品线阵容的新款诺基亚手机就备受期待。

    The new Nokia phones , meant to refresh the somewhat aging lineup of corporate offerings at the Finnish company , were widely expected after leaks on the Internet .

  24. 而后介绍了网络漏洞扫描技术中使用到的关键技术,比如端口扫描、远程操作系统识别、漏洞扫描、插件技术以及一些网络编程的知识。

    Then the technology used in network vulnerability scanning is introduced which includes port scanning , remote OS identification , vulnerability scanning , plugin technology and some network programming technology .

  25. 论文的研究成果已在某总部的工程项目中得到应用,解决了网络漏洞扫描系统的管理信息建模及其综合管理问题。

    The achievement of the dissertation has been used in some headquarters ' project , which solved the problems of network vulnerability scanners ' management information modeling and integrated management well .

  26. 该方法解决了现行方法不能够彻底检测网络漏洞的技术难题,并且提供了便捷的操作界面方便用户的操作。

    The method to solve the current method not only can be completely detect the network vulnerabilities of technical problems , and provides convenient operation convenient user interface of the operation .

  27. 本文设计并实现了一个B/S模式的网络漏洞扫描器,它包含执行端和控制端两个部分。

    In this paper , we design and implement a network vulnerability Scanner , which is based on B / S model and consists of two parts : Sensor and Console .

  28. 首先从分析漏洞探测技术入手,重点分析了基于网络漏洞探测的原理和技术,在此基础上,介绍了一个基于网络安全的漏洞探测系统。

    In this paper , we first analyzed techniques for vulnerability finding , including theories as well as methods , and then illustrated in detail the network based vulnerability scanning system developed by us .

  29. 在网络漏洞评估领域中,虽然已有很多研究成果,但随着网络攻击技术的提升和人们对更高层次网络安全的迫切需要,近年来又出现了不少新的研究点。

    Although vast achievements have been made in the area of network vulnerability assessment , there still remain many problems to solve due to the rapid development of network attack technology and the urgent need for higher level network security .

  30. 经过对安全漏洞扫描器原理的深入分析,以及对现有网络漏洞扫描工具的研究和一些实际的扫描经验,设计和实现了以网络安全管理人员为服务对象的基于端口扫描的安全漏洞检测系统。

    Through studying the security vulnerability scanning principle and the existing network vulnerability scanner and learning from some actual scanning experiences , a security vulnerability scanner is designed and realized . It is based on port scanning for the network security administrators .