...
首页> 外文期刊>Information Systems Security >Employing Proxy Services
【24h】

Employing Proxy Services

机译:使用代理服务

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

As use of the TCP/IP suite expanded during the 1990s in tan- dem with the increased use of the Inter- net, organizations began to realize a new security threat emerged as their networks were connected to the Internet. As aca- demic, government, and commercial net- works were connected to the Internet, they became subject to attack from an unlim- ited population of computer users located throughout the world. Router access lists provide a mechanism to enable or disable the flow of packets through router ports based upon source and destination Inter- net Protocol (IP) address and the type of application data, which is expressed in the form of a port number.
机译:随着TCP / IP套件的使用在1990年代随着Internet的广泛使用而扩展,组织开始意识到随着其网络连接到Internet出现了新的安全威胁。随着学术,政府和商业网络与Internet的连接,它们受到来自全球各地无限制计算机用户的攻击。路由器访问列表提供了一种机制,用于根据源和目标Internet协议(IP)地址以及应用程序数据的类型(以端口号的形式表示)来启用或禁用通过路由器端口的数据包流。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号