| 1. | Research on intranet security and its solution 企业网络信息安全问题及其解决方案研究 |
| 2. | Introducing intranet security resolvent ' s goal , principia , constitutes and keystone 2 .提出网络安全设计的目标、原则、组成部分及侧重点。 |
| 3. | By default , clickonce applications run in the internet or intranet security zones 默认情况下, clickonce应用程序运行在internet或intranet安全区域中。 |
| 4. | An application that performs assembly binding redirection outside the trusted and intranet security zones requires a security permission 如果应用程序在受信任的区域和intranet安全区域外执行程序集绑定重定向,则需要安全权限。 |
| 5. | The highest level of intranet security , however , is a firewall - - software which filters or interrogates all traffic before allowing access into a corporate " safe " system 然而,最高级的内部网安全是防火墙? ?在允许进入公司“安全”系统之前过滤或查问所有信息流的软件。 |
| 6. | But the truth is that nine out of ten break - ins come from inside the organization - - a fact that most firms ignore when it comes to designing intranet security solutions 但实际的情况是十次入侵中九次是来自机构内部? ?这一事实在多数公司设计内特网安全方案时往往被忽视。 |
| 7. | Starting with the analysis of current intranet security , this paper dissected the weakness of normal network firewall system , and exploratively proposed a safe and united framework scheme of computer network firewall system 文中从分析现行企业网的安全入手,剖析了常规网络防火墙系统的不足之处,探索性地提出了构筑安全、统一的网络防火墙系统的框架方案。 |
| 8. | To ensure network usability , at the same time , to protect network security , this paper has done a series of research on the design of intranet security of beijing education examine center as follows : 1 . introduce some prevalent intranet attack 本文对北京教育考试院的现有网络进行了分析,在即要保护网络中信息数据的安全又要保证网络的可用性的要求下,提出了相应的网络安全解决方案。 |
| 9. | 3 . from the point of intranet security view , i divide network into eight module : management module , server module , core module , department distribution module , department entry module , edge distribution module , corporate internet module , vpn and remote access module 3 .从网络安全的角度将整个网络划分为八个模块:管理平台模块、服务器群模块、核心模块、部门分布模块、部门接入模块、边缘分布模块、考试院因特网、 vpn与远程访问。 |
| 10. | Intranet attack include : information - detector , ip - deceive , dos , password - attack , man - in - the - middle - attack , application layer attack , network reconnaissance , trust exploitation , port redirection , virus . it is helpful to obtain complete and distinct security requirements with intranet security risk analysis . 2 主要包括数据包探测器、 ip电子欺骗、拒绝服务、密码攻击、中间人攻击、应用层攻击、网络侦察、信任利用、端口重定向、病毒和特洛伊木马。 |