We have cyber agents who try to follow the electronictrail to get any information that's available.
我们有网络代理谁试图遵循电子轨迹得到任何可用的信息。
2
Control logs automatically record all computer network activity on magnetic disk or tape devices and are a form of an electronic audit trail.
控制日志自动记录所有的电脑网络活动,对磁盘或磁带设备,并是一种形式的电子审计线索。
3
Many key security technologies are involved, such as ID authentication, digital signature and transfer encryption, workflow definition, accreditation application, electronic seal and trail trace.