英语翻译POLICYFigure 3 shows the Georgia Tech campusnetwork policy in terms of a state machine model.The policy can be expressedelegantly with events and transitions among different states.User devices inunauthenticated state cannot access the network.Successful authentication withcredentials (username and password) moves a device to scanning state,whereonly traffic between the vulnerability scanner is allowed.After no knownvulnerabilities are found,a dev
英语翻译
POLICY
Figure 3 shows the Georgia Tech campusnetwork policy in terms of a state machine model.The policy can be expressedelegantly with events and transitions among different states.User devices inunauthenticated state cannot access the network.Successful authentication withcredentials (username and password) moves a device to scanning state,whereonly traffic between the vulnerability scanner is allowed.After no knownvulnerabilities are found,a device can transition to the authentication statewhere the device is finally granted full access to the network.Any infectionevent from an intrusion detection system can move the device state to limited,where access to the network and Internet access are blocked.After five hoursof inactivity,the user is required to authenticate again.
政策图3显示一个状态机模型,乔治亚理工学院校园网的政策.该政策可以expressedelegantly在不同状态的事件和转变.用户设备inunauthenticated状态无法访问网络.认证成功withcredentials(用户名和密码)的移动设备扫描...