Setting that aside for a moment, the other problem with this model is that compromise of the hub exposes all of the business assets in the messaging network.
此话题稍后再谈;该模型的另一个问题在于,中心的损坏将暴露消息网络中的所有业务资产。
2
With this increased awareness, attackers are finding it more difficult to compromise systems at the network level.
由于对这些认识得越来越清楚,攻击者发现在网络级上危害系统更加困难。
3
If the trusted PC works the way it should, an inexperienced or lackadaisical administrator won't be able to unwittingly compromise system or network security through inefficient policies.