伪装攻击 meaning in Chinese
impersonation attack
Examples
- In order to avoid impersonation attacks , you should ban duplicate names and secure computer names by creator
为了避免伪装攻击,应禁止重复的名称,创建者应保护计算机名称的安全。 - Kerberos is essentially a secure network authentication protocol that employs a system of shared secret keys and is able to provide robust security against impersonation and reply attacks
Kerberos实际上是一种安全网络认证协议,采用共享密钥的系统,并且能提供健壮的安全性,以防止伪装攻击和恢复攻击。