<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    英語對應詞索引

    A

    attack ……………………………………………………………… 2.2

    attack pattern …………………………………………………… 3.22

    attacker …………………………………………………………… 2.1

    audit log ………………………………………………………… 3.50

    audit trail ………………………………………………………… 4.17

    B

    backdoor ………………………………………………………… 3.5

    botnet ……………………………………………………………… 3.21

    brute force ………………………………………………………… 3.20

    buffer overflow attack …………………………………………… 3.30

    C

    code execution attack ………………………………………… 3.28

    command execution attack …………………………………… 3.27

    communication log ……………………………………………… 3.51

    critical data ………………………………………………………… 4.3

    critical information system ………………………………………… 4.2

    cross-site request forgery ………………………………………… 3.38

    cross-site scripting attack ………………………………………… 3.26

    cyber asset ………………………………………………………… 3.44

    cyber attack incident ……………………………………………… 4.5

    cyber facility fault incident ………………………………………… 4.8

    cyber security incident ……………………………………………… 2.4

    cyberspace situation awareness …………………………………… 4.15

    D

    DDoS attack ………………………………………………………… 3.36

    Denial of Service …………………………………………………… 3.35

    destructive program ……………………………………………… 3.9

    device fingerprint ……………………………………………… 3.45

    directory traversal attack ………………………………………… 3.31

    disaster incident …………………………………………………… 4.9

    disposal ………………………………………………………… 4.14

    DNS hijack ………………………………………………………… 3.40

    F

    file download attack ……………………………………………… 3.34

    file include attack …………………………………………………… 3.32

    fileupload attack …………………………………………………… 3.33

    flooding attack …………………………………………………… 3.37

    H

    hijack …………………………………………………………… 3.39

    I

    incident vulnerability ……………………………………………… 3.16

    information content security incident ………………………… 4.7

    information destroy incident …………………………………… 4.6

    injection ………………………………………………………… 3.24

    intrusion ……………………………………………………………… 2.3

    L

    log ………………………………………………………………… 3.47

    M

    malicious domainname ………………………………………… 3.11

    malicious IP ………………………………………………………… 3.10

    malware ………………………………………………………… 3.1

    malware incident …………………………………………………… 4.4

    management port remote connection log …………………… 3.52

    N

    network log ……………………………………………………… 3.49

    network traffic …………………………………………………… 3.46

    notification ……………………………………………………… 4.13

    P

    penetration ……………………………………………………… 3.19

    phishing ………………………………………………………… 3.42

    potential hazard …………………………………………………… 3.12

    R

    ransomware ………………………………………………………… 3.8

    S

    scan ……………………………………………………………… 3.17

    sniff ……………………………………………………………… 3.18

    social engineering attack ………………………………………… 3.43

    spyware ……………………………………………………………… 3.7

    SQL injection …………………………………………………… 3.25

    system log ……………………………………………………… 3.48

    T

    target of cybersecurity protection ……………………………… 4.1

    threat ……………………………………………………………… 4.10

    threat information ……………………………………………… 4.11

    traceability ……………………………………………………… 4.16

    trojan horse ……………………………………………………… 3.4

    U

    universal vulnerability ……………………………………………… 3.15

    URL jump attack …………………………………………………… 3.29

    V

    virus ………………………………………………………………… 3.2

    vulnerability ……………………………………………………… 3.13

    vulnerability exploit ……………………………………………… 3.23

    vulnerability level ………………………………………………… 3.14

    W

    warning …………………………………………………………… 4.12

    Web tamper ………………………………………………………… 3.41

    webshell …………………………………………………………… 3.6

    worm ……………………………………………………………… 3.3

    本文章首發在 網安wangan.com 網站上。

    上一篇 下一篇
    討論數量: 0
    只看當前版本


    暫無話題~
    亚洲 欧美 自拍 唯美 另类