| 1. | Audits record security - related actions for later review by a security administrator 审核将记录与安全相关的操作,供安全管理员以后复查。 |
| 2. | The bc security administrator monitoring our activities immediately halted our testing 监视我们活动的银行客户( bc )安全管理员立即停止了我们的测试。 |
| 3. | Security administrator can manage all aspect of the enterprise security infrastructure from this single console 安全管理员仅从这个控制台上就可以管理企业安全基础结构的各个方面。 |
| 4. | This platform system can not only detect and attack in the case of actual combat , but also be used for training the administrator with actual combat experience 该训练平台不仅可以进行在线实战时的检测和攻击,同时也可用于培养有实战经验的网络安全管理员。 |
| 5. | The original equipment manufacturer determines the platform security level of the device and its security policy and can also provide a security administrator with custom permissions for granting access 原始设备制造商( oem )确定设备的平台安全级别和安全策略,还可以为安全管理员提供用于授予访问的自定义权限。 |
| 6. | This allows a security administrator to review any of the auditing events , including the success and failure of a login attempt and the success and failure of permissions in accessing statements and objects 这使得安全管理员可以检查任何审核事件,包括登录尝试的成功与失败,以及访问语句和对象的权限的成功与失败。 |
| 7. | The main difference between ura and it ’ s revocation in delegation and rbac is that the former is mainly performed by delegator and the latter by system administrator or security administrator 与rbac中ura的主要不同在于委托中的ura及其撤销主要是由委托者自己完成,而rbac中的ura及其撤销主要是由系统管理员或安全管理员完成。 |
| 8. | A multiagent - based implementation is also given in the dissertation . the system offer so a extendible , adaptive , intelligent environment for security information and knowledge handling 论文最后给出了一个基于多代理实现的系统,该系统具有很好的系统集成能力、动态适应能力和知识更新能力,为安全管理员提供一个信息决策支持与安全控制管理的环境平台。 |
| 9. | Intrusion detection is gathering and analyzing the information of the important nodes of computer system , detecting whether there has the events that obey the security policy or attack trends , and noticing the administrator 入侵检测是对计算机网络和计算机系统的关键节点的信息进行收集和分析,检测其中是否有违反安全策略的事件或攻击迹象发生,并通知系统安全管理员。 |
| 10. | Intrusion detection system collects the information from the main part of computer network system , then monitors and controls the computer and network traffic for intrusive and suspicious activities . they detect the intrusion not only from the extranet hacker , but also from the intranet users 入侵检测( intrusiondetection )就是对计算机网络和计算机系统的关键结点的信息进行收集分析,然后对计算机和网络资源上的恶意使用行为进行识别和响应,检测其中是否有违反安全策略的事件发生或攻击迹象,并通知系统安全管理员。 |