當前位置:首頁 » 網路連接 » 計算機網路安全翻譯
擴展閱讀
車上有個無線網路信號 2025-05-14 02:23:43

計算機網路安全翻譯

發布時間: 2022-05-23 02:30:53

A. 網路安全英文摘要誰能幫我翻譯一下

Network security is the network hardware, software and system data to be protected, not because of accidental or malicious reasons, suffered damage, alteration, disclosure, the system for normal operation and reliable, network services are not interrupted. Network security is the essence of their network information security. In the broad sense, all related to the network of information confidentiality, integrity, availability, authenticity and controllability of the related technology and theory are the network security research field. Network security is the one involved in computer science, network technology, communications technology, cryptography, information security technology, applied mathematics, number theory, information theory, such as the integrated multi-disciplinary subjects.
Network security as the specific meaning of "perspective" and change. For example: From the users (indivials, businesses, etc.) point of view, they want to involve the interests of personal privacy or commercial information transmission on the network by the confidentiality, integrity and authenticity protection, to avoid other people or against the use of wire-tapping, impersonation, tampering, repudiation, such as a means of violating the interests of users and privacy.
Key words:
Network security analysis,
Network encryption,
Information collection,
Internet Firewall

B. 誰能幫我翻譯一下電腦安全模式下那些英語單詞是什麼意思

翻譯如下:

1、safe mode:安全模式

2、safe mode with networking:帶網路的安全模式

3、safe mode with command prompt:帶命令行的安全模式

4、enable boot logging:打開啟動記錄

5、enable VGA mode:打開VGA模式 VGA是800X600的解析度

6、last known good configuration(you most recent settings that worked):最後一個有效配置

7、directory services restore mode(windows domain controllers only):目錄服務恢復模式

8、debugging mode:調試模式 (程序調試的)

9、start windows normally:進入windows普通啟動(正常啟動)

10、reboot:重新啟動

11、return to os choices menu:返回選擇畫面

(2)計算機網路安全翻譯擴展閱讀:

安全模式的作用如下:

1、刪除頑固文件

在清除某些文件時提示「正在使用中,無法刪除」的,可以進入安全模式將其刪除。

2、查殺病毒

如果電腦中毒了,為了避免病毒交叉感染,讓殺毒更徹底、更干凈,可以在安全模式下進行。

3、更改系統設置

如果做了某些系統設置導致了系統無法正常啟動,可以進入安全模式改回來後再重新進系統。

4、排查無法上網

電腦無法上網時,可以進入帶網路連接的安全模式,如果此時可以上網,可以排查下是哪個程序或服務影響了網路連接。

5、卸載異常的驅動或軟體

驅動程序異常導致進不了系統、卸載軟體始終提示正在運行找不到合適的進程禁用等等,都可以進安全模式卸載,驅動程序可在重啟後再安裝正確的驅動。

C. 網路安全的中文翻譯成英文

The security of network

D. 計算機網路安全是什麼用英語怎麼

What is the use of computer network security?

E. 關於計算機與網路安全的書上的兩行目錄,求翻譯,英譯中

Business Continuity Planning and Disaster Recovery Planning 業務持續性計劃和災難恢復性計劃

這確實是和計算機和網路安全的密切相關的話題。
Business Continuity Planning (BCP)業務持續性計劃是為了將計算機性息系統從災難造成的故障或癱瘓狀態恢復到可正常運行狀態、並將其支持的業務功能從災難造成的不正常狀態恢復到可接受的狀態,而設計的活動或流程。
Disaster Recovery Planning(DRP)災難恢復性計劃是在重大軟硬體故障或設施毀壞事件發生時,用於處理關鍵應用的文檔化的計劃.

F. 誰幫我翻譯一下網路安全的專業英語成中文的,在此先謝謝了。

1.BitLocker 的作用 a.prevent 在藉由結合兩主要的數據-保護的程序 b 遺失或偷計算機之上的未經認可的接觸數據。編加密碼整個的窗口作業系統在硬碟 c 上的體積。查證正直早的長靴成份和長靴結構數據 2.窗口 2003 伺候器中,每個人組的變化 1>.不再有完全的控制一。預先設定地,這每個人小組只有讀而且運行在每駕駛 b 的根方面的許可。這些許可不是被次文件夾遺傳的;這每個人小組有沒有許可預先設定地對一個嶄新產生的文件夾或文件 2>.不再包括作者不詳的使用者僅僅包括使用者和客人 3>.帳戶用無效力的密碼是控制台-范圍 3.窗口 2003 伺候器中, EFS 的變化 EFS 新特徵 (在窗口伺候器 2003 和 Windows XP 專業版)一。另外使用者能被授權存取密碼化的文件 b 。證書能為廢止狀態被檢查當編加密碼文件被分享。(只有當一個使用者被增加一個密碼化的文件時,廢止被檢查) c。離線文件可能是密碼化的 d 。先進的密碼技術標准 (AES)和 DES(3D立體)密碼技術運演算法則是被支援的 e。假設值是 AES-256-一點點的密碼技術 f 。密碼化的文件使用 WebDav g 能在網路文件夾被儲存。EFS 能被窗口伺候器 2003 用聚集 h。文件恢復政策能與較棒的柔性 4 一起配置。PSSU 的作用 1>.後裝備安全更新是一個出現一位管理人在新伺候器之上伐木而且為你提供聯編的第一次,應用更新到你的伺候器而且配置自動的更新 2 的使用者介面>.後裝備安全更新被設計幫助使一個新伺候器安裝免於伺候器首先從窗口更新 5 被連接到最近的安全更新的網路和申請的時間之間的傳染的危險。什麼是 DEP,作用,如何實現 1>.DEP 是一系列硬體,而且運行在記憶上的另外檢查幫助保護對抗懷惡意的密碼的軟體技術開發 2>.硬體運行的 DEP 在一個程序中為所有記憶位置作標記如非可運行的,除非位置明確地包含可運行的密碼

G. 「計算機網路」的英文翻譯

Internet 就是互聯網的意思,用它表示計算機網路最合適

H. 高分啊~!急! 關於網路安全的英文翻譯

國際標准化組織(簡寫為ISO)開放互連系統(簡寫為OSI)訪問模型定義了七個層次的通信類型和它們之間的

介面(見圖1). 每一層取決於它下面一層所提供的服務,一直延伸到物理網路硬體,如計算機的網卡、以及

把這些卡連接在一起的線路.

簡單地看這個模型的方法是把它和我們日常使用的東西:電話作比較.為了讓你和我在聽力所及范圍之外交

談,我們需要一個類似電話的裝置.(在ISO/OSI模型,這位於應用層). 電話,只有在它們能把聲音轉換成電

子脈沖聽通過線路來回傳送時才有用.(這種功能是由應用層以下提供). 最後,我們著手物質的連接:兩者

必須嵌入一個出口,它連接到電話系統的網路交換機中的一個轉換器.

如果我給你打電話,我拿起接收器、撥你的號碼.這個號碼指定了哪個中央交換器來發送我的請求,然後,那

個中央轉換器撥通哪個電話.一旦你接電話,我們開始交談,我們的對話已經開始.從概念上說,計算機網路

的功能跟這一模一樣.

你沒有必要背誦ISO/OSI訪問模型的層次;但知道它們的存在並且沒有下面一層提供的服務每一層將無法工

作是有用的.

什麼是一些熱門的網路?

過去25多年來,一批網路和網路協議已被確定和使用.要去看看其中的兩個網路,兩者都是公共網路.任何人

都可以連接到這兩個網路之一,或者他們可以使用各種網路類型把連接自己的主機(計算機)連接到一起,

而無需連接到公共網路.每種類型採取很不相同的方式提供網路服務.

uucp
uucp(UNIX系統至UNIX系統的復制)原是為連接UNIX系統主機研製(驚訝!).uucp從此被轉化成很多不同的體

系結構,包括個人電腦、互助、amigas,蘋果,視頻調制系統等一切你能命名的和甚至有些你不能命名的.此

外,一些系統已經開發了類似於uucp的原理的.

I. 我想用英語表達:計算機安全已經被人們注意到,這是人們使用計算機時最重要的點之一,表達對嗎

先正表達:注意表達邏輯
計算機網路安全問題已經被人們注意到,這也是人們使用計算機時最關心的問題之一
the computer network security problem has been noticed,It has been one of the most problems that people cares when they using computers.

J. 計算機網路安全英語論文及翻譯求助

Computer network security and to guard against

Abstract: When mankind entered the 21st century information society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China's own characteristics, network security system.

Key words: computer; network; security; prevent

In the information age, information can help groups or indivials so that they benefit from, the same information can also be used to pose a threat to them, caused damage. Therefore network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both complement each other, are indispensable.

First, the concept of computer network security
International Organization for Standardization of "computer security" is defined as: "To establish a data processing system and the adoption of technology and management of security protection, the protection of computer hardware, software, data is not e to accidental and malicious destruction of reasons, change and leakage." The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability protection. Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different. From the ordinary user's point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery; and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and maintain the continuity of network communications.
In essence, the network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides complement each other, are indispensable. Man-made network intrusion and attacks makes network security is facing new challenges.

Second, computer network security status quo
Computer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without disruption. Computer and network technology has the complexity and diversity, makes computer and network security has become a need to continue to update and improve the area. At present, hackers method has been more than the type of computer virus, and many attacks are fatal. In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack computer systems and resulting in network paralysis. Worms, backdoor (Back-doors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks. However, none of these attacks means they reflect the astonishing power of today become worse. These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internet-based protocols and operating system level. From the Web process control proceres to the kernel-level Rootlets. Hackers practices escalating renovation, to the user's ability to guard against information security challenge.

Third, computer network security precautions
1, to strengthen the internal network management and the use of safety awareness among staff, many computer systems commonly used passwords to control access to system resources, which is anti-virus process, the most vulnerable and the most economical methods. Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network resources.
On the network, software installation and management is crucial, it is not only related to network maintenance and management efficiency and quality, but also to the network security. A good antivirus software can be easily installed within minutes to the organization each NT server can also be downloaded and spread to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to become a part of network security management, and automatically provide the best network virus defensive measures. When the computer virus on-line resources applications attack, such as the virus exists in the information-sharing network of media, it is necessary to the security at the gateway, on the network front-end for antivirus.
2, network firewall technology
Is a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection Devices. It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network communication between are allowed to, and monitor the network running. Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not completely prevent the transmission of the virus have been infected with the software or documents, and can not protect against data-driven attacks.
3, security encryption technology
Encryption technology for the global e-commerce to provide a guarantee, so that Internet-based electronic trading system has become possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st century. Symmetric encryption to the conventional password-based technology, computing encryption and decryption operations use the same key. Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people know.
4, the network host operating system security and physical security measures
Network firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level. After the firewall is based on the network host operating system security and physical security measures. In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety measures. These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within. System backup is the last line of defense network system, used to attack after the System Restore. The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response measures. It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem. Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning message. Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of information.
In short, network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea. To this end the establishment of a network with Chinese characteristics, security system, the need for national policies and regulations to support and joint research and development group. Security and anti-security like two sides of contradictions, always pick-up, so the security instry is a future with the development of new technologies and the continuous development of instry.

References:
[1] Huang Yi-qiang, et al. On the software development needs analysis phase of the main tasks. Quarterly Journal of Sun Yat-sen University, 2002 (01).
[2] Hu Daoyuan. Computer LAN [M]. Beijing: Tsinghua University Press, 2001.
[3] Zhu Lisen, even Shougong. Computer Network Application Technology [M]. Beijing: Patent Literature Publishing House, 2001.
[4] Xie Xiren. Computer Networks (4th edition) [M]. Beijing: Publishing House of Electronics Instry, 2003.
[5]孫小剛, Han Dong, et al. Oriented software engineering, Visual C + + Network Programming [M]. Beijing: Tsinghua University Press, 2004,11.

僅供參考,請自借鑒。

希望對您有幫助。

補充:您可以隨時找我,我會幫你翻譯好發過去,隨時歡迎您的咨詢。