Traduzir "mitigate most attacks" para chinês

Mostrando 50 de 50 traduções da frase "mitigate most attacks" de inglês para chinês

Traduções de mitigate most attacks

"mitigate most attacks" em inglês pode ser traduzido nas seguintes palavras/frases chinês:

most
attacks 攻击

Tradução de inglês para chinês de mitigate most attacks

inglês
chinês

EN Email phishing attacks are among the most common and versatile phishing attacks, and often among the most effective. Email phishing attacks often depend on social engineering to manipulate users into clicking malicious links or downloading malware.

ZH 电子邮件网络钓鱼攻击是最常见、最多样的网络钓鱼攻击之一,而且往往也是最有效的方法之一。电子邮件网络钓鱼攻击通常依赖于社会工程来诱导用户点击恶意链接或下载恶意软件。

Transliteração diàn zi yóu jiàn wǎng luò diào yú gōng jī shì zuì cháng jiàn、 zuì duō yàng de wǎng luò diào yú gōng jī zhī yī, ér qiě wǎng wǎng yě shì zuì yǒu xiào de fāng fǎ zhī yī。diàn zi yóu jiàn wǎng luò diào yú gōng jī tōng cháng yī lài yú shè huì gōng chéng lái yòu dǎo yòng hù diǎn jī è yì liàn jiē huò xià zài è yì ruǎn jiàn。

EN Email phishing attacks are among the most common and versatile phishing attacks, and often among the most effective. Email phishing attacks often depend on social engineering to manipulate users into clicking malicious links or downloading malware.

ZH 电子邮件网络钓鱼攻击是最常见、最多样的网络钓鱼攻击之一,而且往往也是最有效的方法之一。电子邮件网络钓鱼攻击通常依赖于社会工程来诱导用户点击恶意链接或下载恶意软件。

Transliteração diàn zi yóu jiàn wǎng luò diào yú gōng jī shì zuì cháng jiàn、 zuì duō yàng de wǎng luò diào yú gōng jī zhī yī, ér qiě wǎng wǎng yě shì zuì yǒu xiào de fāng fǎ zhī yī。diàn zi yóu jiàn wǎng luò diào yú gōng jī tōng cháng yī lài yú shè huì gōng chéng lái yòu dǎo yòng hù diǎn jī è yì liàn jiē huò xià zài è yì ruǎn jiàn。

EN • lastminute.com was being overwhelmed by bot attacks. By moving to Cloudflare, it was able to mitigate these attacks in one fell swoop.

ZH • lastminute.com 曾经遭遇过大量的机器人攻击。借助 Cloudflare,我们得以一次性防护这些攻击

Transliteração • lastminute.com céng jīng zāo yù guò dà liàng de jī qì rén gōng jī。jiè zhù Cloudflare, wǒ men dé yǐ yī cì xìng fáng hù zhè xiē gōng jī。

EN FortiDDoS defends enterprise data centers against DDoS attacks by leveraging an extensive collection of known DDoS methodologies, creating a multi-layered approach to mitigate attacks.

ZH FortiDDoS 利用一系列已知的 DDoS 方法、建立多層方法來排解攻擊, 從而保護企業資料中心免受 DDoS 攻擊。

Transliteração FortiDDoS lì yòng yī xì liè yǐ zhī de DDoS fāng fǎ、 jiàn lì duō céng fāng fǎ lái pái jiě gōng jī, cóng ér bǎo hù qǐ yè zī liào zhōng xīn miǎn shòu DDoS gōng jī。

inglês chinês
ddos ddos

EN Brute force attacks don’t just attack passwords, however. In this guide, we’ll cover the fundamentals of brute force attacks, including how to prevent them, the different attacks and password security tips for users of all experience levels.

ZH 然而,暴力攻击不只是攻击密码。在本指南中,我们将介绍暴力攻击的基础知识,包括如何进行防范、不同类型的攻击以及针对各个经验层次用户的密码安全小贴士。

Transliteração rán ér, bào lì gōng jī bù zhǐ shì gōng jī mì mǎ。zài běn zhǐ nán zhōng, wǒ men jiāng jiè shào bào lì gōng jī de jī chǔ zhī shì, bāo kuò rú hé jìn xíng fáng fàn、 bù tóng lèi xíng de gōng jī yǐ jí zhēn duì gè gè jīng yàn céng cì yòng hù de mì mǎ ān quán xiǎo tiē shì。

EN Brute force attacks don’t just attack passwords, however. In this guide, we’ll cover the fundamentals of brute force attacks, including how to prevent them, the different attacks and password security tips for users of all experience levels.

ZH 然而,暴力攻击不只是攻击密码。在本指南中,我们将介绍暴力攻击的基础知识,包括如何进行防范、不同类型的攻击以及针对各个经验层次用户的密码安全小贴士。

Transliteração rán ér, bào lì gōng jī bù zhǐ shì gōng jī mì mǎ。zài běn zhǐ nán zhōng, wǒ men jiāng jiè shào bào lì gōng jī de jī chǔ zhī shì, bāo kuò rú hé jìn xíng fáng fàn、 bù tóng lèi xíng de gōng jī yǐ jí zhēn duì gè gè jīng yàn céng cì yòng hù de mì mǎ ān quán xiǎo tiē shì。

EN Cloudflare centralized and decentralized mitigation systems work in concert to identify and mitigate most DDoS attacks in under 3 seconds. Preconfigured static rules are deployed in less than 1 second.

ZH Cloudflare 集中化分散式緩解系統彼此策應,在 __3 秒__以內聯合識別並緩解大多數 DDoS 攻擊。只需不到 1 秒,預先設定的靜態規則便可完成部署。

Transliteração Cloudflare jí zhōng huà hé fēn sàn shì huǎn jiě xì tǒng bǐ cǐ cè yīng, zài __3 miǎo__yǐ nèi lián hé shí bié bìng huǎn jiě dà duō shù DDoS gōng jī。zhǐ xū bù dào 1 miǎo, yù xiān shè dìng de jìng tài guī zé biàn kě wán chéng bù shǔ。

inglês chinês
ddos ddos

EN Mitigate most attacks in under 3 seconds

ZH 在 3 秒內緩解大多數攻擊

Transliteração zài 3 miǎo nèi huǎn jiě dà duō shù gōng jī

EN Cloudflare centralized and decentralized mitigation systems work in concert to identify and mitigate most DDoS attacks in under 3 seconds. Preconfigured static rules are deployed in less than 1 second.

ZH Cloudflare 集中化分散式緩解系統彼此策應,在 __3 秒__以內聯合識別並緩解大多數 DDoS 攻擊。只需不到 1 秒,預先設定的靜態規則便可完成部署。

Transliteração Cloudflare jí zhōng huà hé fēn sàn shì huǎn jiě xì tǒng bǐ cǐ cè yīng, zài __3 miǎo__yǐ nèi lián hé shí bié bìng huǎn jiě dà duō shù DDoS gōng jī。zhǐ xū bù dào 1 miǎo, yù xiān shè dìng de jìng tài guī zé biàn kě wán chéng bù shǔ。

inglês chinês
ddos ddos

EN Stop the largest attacks with unmetered, always-on protection that operates at the network edge, reducing time-to-mitigate and eliminating web performance penalties.

ZH 通過運行於網路邊緣的無計量全時保護阻止最大規模攻擊,縮短緩解時間,並減輕 web 效能損失。

Transliteração tōng guò yùn xíng yú wǎng lù biān yuán de wú jì liàng quán shí bǎo hù zǔ zhǐ zuì dà guī mó gōng jī, suō duǎn huǎn jiě shí jiān, bìng jiǎn qīng web xiào néng sǔn shī。

EN Attacks will strike. Mitigate the impact.

ZH 攻擊終會發動。減輕影響是關鍵。

Transliteração gōng jī zhōng huì fā dòng。jiǎn qīng yǐng xiǎng shì guān jiàn。

EN Your network enables you to deliver patients the care they need. Protect it with Cloudflare and mitigate DDoS attacks as close to the source as possible, for faster response time.

ZH 您的網路使您能夠向患者提供其所需的保健服務。借助 Cloudflare 保護您的網路,並在盡可能接近來源的位置緩解 DDoS 攻擊,以獲得更快的回應時間。

Transliteração nín de wǎng lù shǐ nín néng gòu xiàng huàn zhě tí gōng qí suǒ xū de bǎo jiàn fú wù。jiè zhù Cloudflare bǎo hù nín de wǎng lù, bìng zài jǐn kě néng jiē jìn lái yuán de wèi zhì huǎn jiě DDoS gōng jī, yǐ huò dé gèng kuài de huí yīng shí jiān。

inglês chinês
ddos ddos

EN Communicate and share attack data upstream to mitigate attacks closer to the attacker.

ZH 与上游运营商通信共享攻击数据,以在更靠近攻击者位置来缓解攻击

Transliteração yǔ shàng yóu yùn yíng shāng tōng xìn hé gòng xiǎng gōng jī shù jù, yǐ zài gèng kào jìn gōng jī zhě wèi zhì lái huǎn jiě gōng jī。

EN How to Mitigate the Risk of Ransomware Attacks

ZH 如何降低勒索软件攻击的风险

Transliteração rú hé jiàng dī lēi suǒ ruǎn jiàn gōng jī de fēng xiǎn

EN What Can Companies Do to Mitigate the Risk of Software Supply Chain Attacks?

ZH 公司可以采取什么措施来减少软件供应链攻击的风险?

Transliteração gōng sī kě yǐ cǎi qǔ shén me cuò shī lái jiǎn shǎo ruǎn jiàn gōng yīng liàn gōng jī de fēng xiǎn?

EN 1) DMARC Helps Mitigate Impersonation Attacks

ZH 1) DMARC有助于缓解冒名顶替的攻击

Transliteração 1) DMARC yǒu zhù yú huǎn jiě mào míng dǐng tì de gōng jī

inglês chinês
dmarc dmarc

EN MTA-Strict Transport Security (MTA-STS) is a security protocol designed to mitigate both MITM attacks. Here’s how it does that:

ZH MTA-严格传输安全(MTA-STS)是一个安全协议,旨在减轻MITM攻击。下面是它是如何做到这一点的。

Transliteração MTA-yán gé chuán shū ān quán (MTA-STS) shì yī gè ān quán xié yì, zhǐ zài jiǎn qīngMITM gōng jī。xià miàn shì tā shì rú hé zuò dào zhè yī diǎn de。

EN Make encryption mandatory in SMTP with MTA-STS to mitigate MITM attacks

ZH 使用MTA-STS对SMTP进行强制加密,以减轻MITM攻击

Transliteração shǐ yòngMTA-STS duìSMTP jìn xíng qiáng zhì jiā mì, yǐ jiǎn qīngMITM gōng jī。

EN MTA-Strict Transport Security (MTA-STS) is a security protocol designed to mitigate both MITM attacks. Here’s how it does that:

ZH MTA-严格传输安全(MTA-STS)是一个安全协议,旨在减轻MITM攻击。下面是它是如何做到这一点的。

Transliteração MTA-yán gé chuán shū ān quán (MTA-STS) shì yī gè ān quán xié yì, zhǐ zài jiǎn qīngMITM gōng jī。xià miàn shì tā shì rú hé zuò dào zhè yī diǎn de。

EN How to Mitigate the Risk of Ransomware Attacks

ZH 如何降低勒索软件攻击的风险

Transliteração rú hé jiàng dī lēi suǒ ruǎn jiàn gōng jī de fēng xiǎn

EN What Can Companies Do to Mitigate the Risk of Software Supply Chain Attacks?

ZH 公司可以采取什么措施来减少软件供应链攻击的风险?

Transliteração gōng sī kě yǐ cǎi qǔ shén me cuò shī lái jiǎn shǎo ruǎn jiàn gōng yīng liàn gōng jī de fēng xiǎn?

EN Communicate and share attack data upstream to mitigate attacks closer to the attacker.

ZH 与上游运营商通信共享攻击数据,以在更靠近攻击者位置来缓解攻击

Transliteração yǔ shàng yóu yùn yíng shāng tōng xìn hé gòng xiǎng gōng jī shù jù, yǐ zài gèng kào jìn gōng jī zhě wèi zhì lái huǎn jiě gōng jī。

EN Challenge: Mitigate frequent DDoS attacks and secure remote access to merchant admin portal

ZH 挑战:缓解频繁的 DDoS 攻击,安全地远程访问商家管理门户

Transliteração tiāo zhàn: huǎn jiě pín fán de DDoS gōng jī, ān quán de yuǎn chéng fǎng wèn shāng jiā guǎn lǐ mén hù

inglês chinês
ddos ddos

EN How can we improve the cybersecurity and email authentication infrastructure in Bahrain to mitigate impersonation attacks?

ZH 我们如何改进巴林的网络安全电子邮件认证基础设施,以减轻冒名顶替攻击

Transliteração wǒ men rú hé gǎi jìn bā lín de wǎng luò ān quán hé diàn zi yóu jiàn rèn zhèng jī chǔ shè shī, yǐ jiǎn qīng mào míng dǐng tì gōng jī?

EN Detect threats early ? including unauthorized domain replication, offline extraction of your AD database, and domain-level GPO linking ? to mitigate and avoid costly ransomware attacks.

ZH 及早检测威胁(包括未经授权的域复制、脱机提取AD数据库以及域级别的GPO链接),以减轻甚至避免代价高昂的勒索软件攻击

Transliteração jí zǎo jiǎn cè wēi xié (bāo kuò wèi jīng shòu quán de yù fù zhì、 tuō jī tí qǔAD shù jù kù yǐ jí yù jí bié deGPO liàn jiē), yǐ jiǎn qīng shén zhì bì miǎn dài jià gāo áng de lēi suǒ ruǎn jiàn gōng jī。

EN How to Mitigate the Risk of Supply Chain Attacks

ZH 如何降低供应链攻击的风险

Transliteração rú hé jiàng dī gōng yīng liàn gōng jī de fēng xiǎn

EN Our always-on protection identifies and mitigates most attacks in under three seconds. Blocking attacks from the network edge reduces latency, keeping traffic blazing fast.

ZH 我們的全時保護可在三秒內識別並緩解大多數攻擊。從網路邊緣阻止攻擊可減少延遲,使流量保持高速增長。

Transliteração wǒ men de quán shí bǎo hù kě zài sān miǎo nèi shí bié bìng huǎn jiě dà duō shù gōng jī。cóng wǎng lù biān yuán zǔ zhǐ gōng jī kě jiǎn shǎo yán chí, shǐ liú liàng bǎo chí gāo sù zēng zhǎng。

EN Gaming companies are often vulnerable to DDoS attacks. Game platforms that rely on custom TCP and UDP communication protocols require even more resources to secure against DDoS attacks.

ZH 遊戲公司經常容易遭受 DDoS 攻擊。依賴於自訂 TCP UDP 通訊協定的遊戲平台需要更多資源來抵禦 DDoS 攻擊。

Transliteração yóu xì gōng sī jīng cháng róng yì zāo shòu DDoS gōng jī。yī lài yú zì dìng TCP hé UDP tōng xùn xié dìng de yóu xì píng tái xū yào gèng duō zī yuán lái dǐ yù DDoS gōng jī。

inglês chinês
ddos ddos
tcp tcp
udp udp

EN "Cloudflare has an incredibly large network and infrastructure to stop really large attacks on the DNS system. We just get clean requests and never have to deal with malicious traffic or attacks on the DNS infrastructure."

ZH 「Cloudflare 的網路基礎結構大到令人難以置信,能夠阻止 DNS 系統上非常大的攻擊。我們只會收到乾淨的請求,從不需要處理 DNS 基礎結構上的惡意流量或攻擊。」

Transliteração 「Cloudflare de wǎng lù hé jī chǔ jié gòu dà dào lìng rén nán yǐ zhì xìn, néng gòu zǔ zhǐ DNS xì tǒng shàng fēi cháng dà de gōng jī。wǒ men zhǐ huì shōu dào gān jìng de qǐng qiú, cóng bù xū yào chù lǐ DNS jī chǔ jié gòu shàng de è yì liú liàng huò gōng jī。」

inglês chinês
dns dns

EN AED offers best in class DDoS protection. AED can stop DDoS attacks as large as 40 Gbps and due to its stateless packet processing technology, AED can stop TCP-state exhaustion attacks that target and impact stateful devices such as NGFWs.

ZH AED 提供一流的 DDoS 防护。AED 可拦截高达 40Gbps 的 DDoS 攻击,并且由于其采用无状态数据包处理技术,可阻止针对影响 NGFW 等有状态设备的 TCP 状态耗尽攻击

Transliteração AED tí gōng yī liú de DDoS fáng hù。AED kě lán jié gāo dá 40Gbps de DDoS gōng jī, bìng qiě yóu yú qí cǎi yòng wú zhuàng tài shù jù bāo chù lǐ jì shù, kě zǔ zhǐ zhēn duì hé yǐng xiǎng NGFW děng yǒu zhuàng tài shè bèi de TCP zhuàng tài hào jǐn gōng jī。

inglês chinês
ddos ddos

EN Because AED can stop all types of DDoS attacks, it should be deployed in front of your firewalls to protect them and the services behind them from DDoS attacks.

ZH AED 可阻止所有类型的 DDoS 攻击,应当部署在防火墙之前,以保护防火墙及后端服务免受 DDoS 攻击

Transliteração AED kě zǔ zhǐ suǒ yǒu lèi xíng de DDoS gōng jī, yīng dāng bù shǔ zài fáng huǒ qiáng zhī qián, yǐ bǎo hù fáng huǒ qiáng jí hòu duān fú wù miǎn shòu DDoS gōng jī。

inglês chinês
ddos ddos

EN Citrix ADC CPX has proven algorithms to manage attacks that exploit weaknesses in TCP, HTTP, and DNS. By using CPX for all app-to-app traffic, you can protect apps from DDoS attacks from the outside and inside.

ZH Citrix ADC CPX 具有经过验证的算法,可应对利用 TCP、HTTP DNS 中的漏洞实施的攻击。通过对所有应用到应用的流量使用 CPX,您可以保护应用免受来自内外的 DDoS 攻击

Transliteração Citrix ADC CPX jù yǒu jīng guò yàn zhèng de suàn fǎ, kě yīng duì lì yòng TCP、HTTP hé DNS zhōng de lòu dòng shí shī de gōng jī。tōng guò duì suǒ yǒu yīng yòng dào yīng yòng de liú liàng shǐ yòng CPX, nín kě yǐ bǎo hù yīng yòng miǎn shòu lái zì nèi wài de DDoS gōng jī。

inglês chinês
citrix citrix
cpx cpx
tcp tcp
http http
dns dns
ddos ddos

EN Supply chain attacks come in many forms, including software, hardware and firmware attacks.

ZH 供应链攻击有多种形式,包括软件、硬件固件攻击

Transliteração gōng yīng liàn gōng jī yǒu duō zhǒng xíng shì, bāo kuò ruǎn jiàn、 yìng jiàn hé gù jiàn gōng jī。

EN Preventing man in the middle attacks can save businesses thousands in damages and keep their web and public identities intact. Here are some essential tools to help prevent MITM attacks:

ZH 防范中间人攻击可以为企业节省成千上万的损失,并保持其网络公众身份完好无损。以下是有助于防范 MITM 攻击的一些重要工具:

Transliteração fáng fàn zhōng jiān rén gōng jī kě yǐ wèi qǐ yè jié shěng chéng qiān shàng wàn de sǔn shī, bìng bǎo chí qí wǎng luò hé gōng zhòng shēn fèn wán hǎo wú sǔn。yǐ xià shì yǒu zhù yú fáng fàn MITM gōng jī de yī xiē zhòng yào gōng jù:

EN Protecting yourself and your business against phishing attacks can mean the difference between financial ruin and better cybersecurity overall. Here are some helpful tips for protecting against these common and effective cyber attacks.

ZH 保护您自己您的企业免受网络钓鱼攻击可能意味着是财务破产还是整体网络安全改善的区别。以下是一些有用的小贴士,可用于防范这些常见而有效的网络攻击

Transliteração bǎo hù nín zì jǐ hé nín de qǐ yè miǎn shòu wǎng luò diào yú gōng jī kě néng yì wèi zhe shì cái wù pò chǎn hái shì zhěng tǐ wǎng luò ān quán gǎi shàn de qū bié。yǐ xià shì yī xiē yǒu yòng de xiǎo tiē shì, kě yòng yú fáng fàn zhè xiē cháng jiàn ér yǒu xiào de wǎng luò gōng jī。

EN A PUF-based authentication utilizes AES, a key protection for shared secrets and high-quality nonce to achieve a robust authentication. It can protect against the prediction attacks for the nonce and physical attacks for the shared secret.

ZH 利用AES的PUF身份验证,透过对共享机密的密钥保护高质量的随机数来实现可靠的身份验证。它可以防止针对随机数的预测攻击针对共享机密的物理攻击

Transliteração lì yòngAES dePUF shēn fèn yàn zhèng, tòu guò duì gòng xiǎng jī mì de mì yào bǎo hù hé gāo zhì liàng de suí jī shù lái shí xiàn kě kào de shēn fèn yàn zhèng。tā kě yǐ fáng zhǐ zhēn duì suí jī shù de yù cè gōng jī hé zhēn duì gòng xiǎng jī mì de wù lǐ gōng jī。

inglês chinês
aes aes

EN Whirlwind deals 25% more damage and now affects your next 4 single-target melee attacks, instead of the next 2 attacks.

ZH 旋風斬造成的傷害提高25%,且現在會影響你下4次的單一目標近戰攻擊,而非下2次的攻擊。

Transliteração xuán fēng zhǎn zào chéng de shāng hài tí gāo25%, qiě xiàn zài huì yǐng xiǎng nǐ xià4cì de dān yī mù biāo jìn zhàn gōng jī, ér fēi xià2cì de gōng jī。

EN DMARC, SPF and DKIM can help you defend your domain against phishing and spoofing attacks, and other forms of online threats. We help you onboard the protocols with ease to bypass these attacks without compromising on deliverability.

ZH DMARC、SPFDKIM可以帮助你保护你的域名免受网络钓鱼欺骗性攻击,以及其他形式的在线威胁。我们帮助你轻松地加入这些协议,在不影响交付能力的情况下绕过这些攻击

Transliteração DMARC、SPF héDKIM kě yǐ bāng zhù nǐ bǎo hù nǐ de yù míng miǎn shòu wǎng luò diào yú hé qī piàn xìng gōng jī, yǐ jí qí tā xíng shì de zài xiàn wēi xié。wǒ men bāng zhù nǐ qīng sōng de jiā rù zhè xiē xié yì, zài bù yǐng xiǎng jiāo fù néng lì de qíng kuàng xià rào guò zhè xiē gōng jī。

inglês chinês
dmarc dmarc
dkim dkim
and

EN DMARC at the correct policy can protect against domain spoofing attacks, email phishing attacks, and BEC.

ZH 在正确的政策下,DMARC可以防止域名欺骗攻击、电子邮件网络钓鱼攻击BEC。

Transliteração zài zhèng què de zhèng cè xià,DMARC kě yǐ fáng zhǐ yù míng qī piàn gōng jī、 diàn zi yóu jiàn wǎng luò diào yú gōng jī héBEC。

inglês chinês
dmarc dmarc

EN In this case, while your root domain is protected against spoofing attacks, your subdomains even if you don’t use them to exchange information would still be vulnerable to impersonation attacks.

ZH 在这种情况下,虽然你的根域被保护免受欺骗攻击,但你的子域即使不使用它们来交换信息,仍会受到冒充攻击

Transliteração zài zhè zhǒng qíng kuàng xià, suī rán nǐ de gēn yù bèi bǎo hù miǎn shòu qī piàn gōng jī, dàn nǐ de zi yù jí shǐ bù shǐ yòng tā men lái jiāo huàn xìn xī, réng huì shòu dào mào chōng gōng jī。

EN On-premise protection guards against state-exhausting attacks aimed at security infrastructure. It also helps prevent stealthy attacks that bypass Firewalls and Intrusion Prevention Systems (IPS) and target business-critical applications.

ZH 本地保护可防止针对安全基础架构的状态耗尽型的攻击。它还有助于防止绕过防火墙入侵防御系统 (IPS) 并针对业务关键型应用的隐蔽攻击

Transliteração běn de bǎo hù kě fáng zhǐ zhēn duì ān quán jī chǔ jià gòu de zhuàng tài hào jǐn xíng de gōng jī。tā hái yǒu zhù yú fáng zhǐ rào guò fáng huǒ qiáng hé rù qīn fáng yù xì tǒng (IPS) bìng zhēn duì yè wù guān jiàn xíng yīng yòng de yǐn bì gōng jī。

inglês chinês
ips ips

EN A PUF-based authentication utilizes AES, a key protection for shared secrets and high-quality nonce to achieve a robust authentication. It can protect against the prediction attacks for the nonce and physical attacks for the shared secret.

ZH 利用AES的PUF身份验证,透过对共享机密的密钥保护高质量的随机数来实现可靠的身份验证。它可以防止针对随机数的预测攻击针对共享机密的物理攻击

Transliteração lì yòngAES dePUF shēn fèn yàn zhèng, tòu guò duì gòng xiǎng jī mì de mì yào bǎo hù hé gāo zhì liàng de suí jī shù lái shí xiàn kě kào de shēn fèn yàn zhèng。tā kě yǐ fáng zhǐ zhēn duì suí jī shù de yù cè gōng jī hé zhēn duì gòng xiǎng jī mì de wù lǐ gōng jī。

inglês chinês
aes aes

EN Supply chain attacks come in many forms, including software, hardware and firmware attacks.

ZH 供应链攻击有多种形式,包括软件、硬件固件攻击

Transliteração gōng yīng liàn gōng jī yǒu duō zhǒng xíng shì, bāo kuò ruǎn jiàn、 yìng jiàn hé gù jiàn gōng jī。

EN Preventing man in the middle attacks can save businesses thousands in damages and keep their web and public identities intact. Here are some essential tools to help prevent MITM attacks:

ZH 防范中间人攻击可以为企业节省成千上万的损失,并保持其网络公众身份完好无损。以下是有助于防范 MITM 攻击的一些重要工具:

Transliteração fáng fàn zhōng jiān rén gōng jī kě yǐ wèi qǐ yè jié shěng chéng qiān shàng wàn de sǔn shī, bìng bǎo chí qí wǎng luò hé gōng zhòng shēn fèn wán hǎo wú sǔn。yǐ xià shì yǒu zhù yú fáng fàn MITM gōng jī de yī xiē zhòng yào gōng jù:

EN Protecting yourself and your business against phishing attacks can mean the difference between financial ruin and better cybersecurity overall. Here are some helpful tips for protecting against these common and effective cyber attacks.

ZH 保护您自己您的企业免受网络钓鱼攻击可能意味着是财务破产还是整体网络安全改善的区别。以下是一些有用的小贴士,可用于防范这些常见而有效的网络攻击

Transliteração bǎo hù nín zì jǐ hé nín de qǐ yè miǎn shòu wǎng luò diào yú gōng jī kě néng yì wèi zhe shì cái wù pò chǎn hái shì zhěng tǐ wǎng luò ān quán gǎi shàn de qū bié。yǐ xià shì yī xiē yǒu yòng de xiǎo tiē shì, kě yòng yú fáng fàn zhè xiē cháng jiàn ér yǒu xiào de wǎng luò gōng jī。

EN On-premise protection guards against state-exhausting attacks aimed at security infrastructure. It also helps prevent stealthy attacks that bypass Firewalls and Intrusion Prevention Systems (IPS) and target business-critical applications.

ZH 本地保护可防止针对安全基础架构的状态耗尽型的攻击。它还有助于防止绕过防火墙入侵防御系统 (IPS) 并针对业务关键型应用的隐蔽攻击

Transliteração běn de bǎo hù kě fáng zhǐ zhēn duì ān quán jī chǔ jià gòu de zhuàng tài hào jǐn xíng de gōng jī。tā hái yǒu zhù yú fáng zhǐ rào guò fáng huǒ qiáng hé rù qīn fáng yù xì tǒng (IPS) bìng zhēn duì yè wù guān jiàn xíng yīng yòng de yǐn bì gōng jī。

inglês chinês
ips ips

EN AED offers best in class DDoS protection. AED can stop DDoS attacks as large as 40 Gbps and due to its stateless packet processing technology, AED can stop TCP-state exhaustion attacks that target and impact stateful devices such as NGFWs.

ZH AED 提供一流的 DDoS 防护。AED 可拦截高达 40Gbps 的 DDoS 攻击,并且由于其采用无状态数据包处理技术,可阻止针对影响 NGFW 等有状态设备的 TCP 状态耗尽攻击

Transliteração AED tí gōng yī liú de DDoS fáng hù。AED kě lán jié gāo dá 40Gbps de DDoS gōng jī, bìng qiě yóu yú qí cǎi yòng wú zhuàng tài shù jù bāo chù lǐ jì shù, kě zǔ zhǐ zhēn duì hé yǐng xiǎng NGFW děng yǒu zhuàng tài shè bèi de TCP zhuàng tài hào jǐn gōng jī。

inglês chinês
ddos ddos

EN Because AED can stop all types of DDoS attacks, it should be deployed in front of your firewalls to protect them and the services behind them from DDoS attacks.

ZH AED 可阻止所有类型的 DDoS 攻击,应当部署在防火墙之前,以保护防火墙及后端服务免受 DDoS 攻击

Transliteração AED kě zǔ zhǐ suǒ yǒu lèi xíng de DDoS gōng jī, yīng dāng bù shǔ zài fáng huǒ qiáng zhī qián, yǐ bǎo hù fáng huǒ qiáng jí hòu duān fú wù miǎn shòu DDoS gōng jī。

inglês chinês
ddos ddos

EN “Some DDoS attacks were slowing the portal,” Hersh adds. “Putting Access in front of it helped prevent DDoS attacks and potential downtime, and it also made merchant logins more secure.”

ZH Hersh 补充道,“一些 DDoS 攻击减慢了门户的速度。将 Access 置于其前方,不仅有助于防止 DDoS 攻击潜在停机时间,还能使商家登录更加安全。”

Transliteração Hersh bǔ chōng dào,“yī xiē DDoS gōng jī jiǎn màn le mén hù de sù dù。jiāng Access zhì yú qí qián fāng, bù jǐn yǒu zhù yú fáng zhǐ DDoS gōng jī hé qián zài tíng jī shí jiān, hái néng shǐ shāng jiā dēng lù gèng jiā ān quán。”

EN The Cloudflare WAF was able to block over 400 attacks to one particular site over the course of a single day, while also improving that site's performance, which led to a more stable user experience and less time wasted dealing with these attacks.

ZH Cloudflare WAF 能够在一天的时间内阻止对一个特定站点的 400 多次攻击,同时还能提高该站点的性能,进而带来了更加稳定的用户体验,并减少了处理这些攻击的时间。

Transliteração Cloudflare WAF néng gòu zài yī tiān de shí jiān nèi zǔ zhǐ duì yī gè tè dìng zhàn diǎn de 400 duō cì gōng jī, tóng shí hái néng tí gāo gāi zhàn diǎn de xìng néng, jìn ér dài lái le gèng jiā wěn dìng de yòng hù tǐ yàn, bìng jiǎn shǎo le chù lǐ zhè xiē gōng jī de shí jiān。

Mostrando 50 de 50 traduções