A full range of computer network security architecture contains a network of physical security, access control security, system security, user security, information encryption and safe transmission and management security, etc. Make full use of various advanced host security technology, authentication technology, access control technology, password technology, firewall technology and security audit technology, security management technology, system vulnerabilities detection technology, hackers tracking technology, between the attacker and the protected resource to establish more strict security defense line, can greatly increase the difficulty of the malicious attacks, and increased the number of audit information, the audit information can be used to track the invaders.
A full range of computer network security architecture includes physical security, network security, access control, system security, user security, information encryption, safe transmission and management security. Make full use of all kinds of security technology host advanced, identity authentication technology, access control technology, encryption technology, firewall technology, security audit, security management technology, system vulnerability detection technology, hacker tracking technology, establish multi safety line tight in the attacker and protected resources, can greatly increase the malicious attack difficulty, and increasing the number of audit information, the audit information can track the intruder.
字幕长才5分,50分就帮你翻译