Apr 13, 2009 15:46
15 yrs ago
English term
Stale versions of these systems
English to Russian
Tech/Engineering
IT (Information Technology)
Requirement
11.4 Use intrusion detection systems, and/or intrusion prevention systems to monitor all traffic in the cardholder data environment and alert personnel to suspected compromises. Keep all intrusion detection and prevention engines up-to-date.
Guidance
These tools compare the traffic coming into the network with known “signatures” of thousands of compromise types (hacker tools, Trojans and other malware), and send alerts and/or stop the attempt as it happens. Without a proactive approach to unauthorized activity detection via these tools, attacks on (or misuse of) computer resources could go unnoticed in real time. Security alerts generated by these tools should be monitored, so that the attempted intrusions can be stopped.
There are thousands of compromise types, with more being discovered on a daily basis. Stale versions of these systems will not have current “signatures” and will not identify new vulnerabilities that could lead to an undetected breach. Vendors of these products provide frequent, often daily, updates.
11.4 Use intrusion detection systems, and/or intrusion prevention systems to monitor all traffic in the cardholder data environment and alert personnel to suspected compromises. Keep all intrusion detection and prevention engines up-to-date.
Guidance
These tools compare the traffic coming into the network with known “signatures” of thousands of compromise types (hacker tools, Trojans and other malware), and send alerts and/or stop the attempt as it happens. Without a proactive approach to unauthorized activity detection via these tools, attacks on (or misuse of) computer resources could go unnoticed in real time. Security alerts generated by these tools should be monitored, so that the attempted intrusions can be stopped.
There are thousands of compromise types, with more being discovered on a daily basis. Stale versions of these systems will not have current “signatures” and will not identify new vulnerabilities that could lead to an undetected breach. Vendors of these products provide frequent, often daily, updates.
Proposed translations
(Russian)
3 +5 | устаревшие версии | Marina SP |
4 | более ранние версии этих систем | Vladimir Bragilevsky |
Proposed translations
+5
2 mins
Selected
устаревшие версии
4 KudoZ points awarded for this answer.
2 mins
Something went wrong...