在第二部分,将讨论关于在供应链中审计系统的重要性和为供应链提供了哪一类帮助。
And finally in the second part I will be discussing about the importance of auditing across the supply chain and what kind of benefits it is providing to the supply chain.
信息捕捉与还原技术是网络安全技术中审计系统实施的一个难点,同时也是实现审计系统的基础。
In auditing system about network security, the technology about information catching and reverting is a difficult problem. At the same time, it is also foundation problem.
度量结果在审计系统前构建到队列中,耗尽度量结果池。
The measurements build up on the queue in front of the auditing system, exhausting the measurement pool.
Auditor: (v7中增加的)具有此角色的用户可以配置审计系统,但是没有其他任何权限。
Auditor: (added in V7) Users with this role can configure the auditing system and nothing else.
审计信息可以存储在每个系统上系统管理员指定的本地文件中,也可以发送到远程系统以便进行集中的日志记录。
The audit information can be stored locally on each system in a file designated by the system administrator, or can be sent to a remote system for centralized logging.
例程系统审计过程中需要验证的安全性需求应该与系统安装过程中使用的需求和安全性准则相同。
The security requirements that you verify during routine system auditing should be the same requirements and security principles that guide the system installation.
TraceabilityServer 2.0还包含一个审计组件,它可以对系统中的所有主要操作进行跟踪。
The Traceability Server 2.0 also includes an audit component that enables all major operations in the system to be tracked.
在整个系统审计中,复核性测试应当成为测试的标准形式。
Compliance testing should be the standard form of testing used during systems auditing.
为了让审计系统了解如何将每个对象作为一条记录输出到审计日志中,需要使用 /etc/security/events文件中的相应条目。
For audit to understand how to print each object as a record to the audit log, it needs a corresponding entry in the /etc/security/events file.
网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息。
In network system there is a large amount of log audit data which contain much information related to security.
在这份报告中,主要采用文献综述法分析如今企业界的两个重要部分:供应链的环境管理体系(EMS)和审计系统。
In this report, I will mainly concentrate on literature on two vital parts of today's corporate world: Environmental Management System (EMS) and auditing of supply chains.
入侵检测通过分析审计事件,发现系统中异常活动,是电子警务安全保护的一条重要途径。
Intrusive-detection is an important approach to protecting electronic policing by means of analyzing the audit affairs and detecting the abnormal events in the system.
另外,我们对IDMEF进行了扩展,以支持系统中审计数据上报、规则发布、响应指令、协作分析等要求。
So we extend the IDMEF to support audit data report, detection rules distribution, response instruction, and cooperative analysis in the system.
如果你想在本地设置特定事件(例如系统登录和关闭)的审计,那么你就可以在本地安全政策控制面板中制定该事件。
If you want to set specific event in this locality (the system logins and shut for example) audit, so you can be in this locality safety makes this event in policy Control Panel.
其次,对应用系统中的现场审计实施系统的需求作了详细分析,主要包括其业务系统分析和数据采集的分析。
Then, the requirements of the spot auditing operation system in the application are analyzed in detail, including the analysis of its operation system and data collection.
为了改善FBI资金系统的监管工作,防止拖欠电话费事件的再度发生,审计报告中还提出了16条整改建议,FBI已同意采纳其中的11条。
The FBI has a GREed to accept 11 of the 16 recommendations to improve the agency's tracking and management of the funding system to prevent such failure in phone bill payment.
目前,提出的方法中定性的方法比较多,而结合信息系统安全评分与审计决策的方法较少。
At present, there are more qualitative techniques presented, and less quantitative techniques combining audit decision with safety judgment on information systems.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
随着网络规模的扩大,日志审计系统中单个日志服务器受到处理能力的限制,已经成为系统的瓶颈。
With the expanding of network size, the transacting capability of the single log server in log audit system is limited, which has already become the bottleneck of that system.
从内部审计的路径入手,系统分析了风险管理审计和风险导向内部审计在企业风险管理中的具体应用。
This article starts with the path of internal audit to get a systematic analysis of specific applications of risk management audit and risk-oriented internal audit in enterprise risk management.
在此审计系统中,通过在核内及应用程序中设置审计点,以全面地收集数据;
This subsystem can collect data systematically by mounting audit points in the kernel layer as well as in the application layer.
基于可信用电子商务系统体系架构的可信用电子商务理想模型,主要涉及交易中的信用审计及分布式工作流程管理。
The ideal model, based on credibility e-commerce system architecture, is related to the credit audit and distributed workflow system.
实践中应改善内部控制环境、建立风险控制子系统、重视内部会计控制和内部审计的作用及实行内部控制信息披露制度。
In practice improve the internal control environment, set up risk control subsystem, pay attention to internal accounting control and internal audit.
因此有必要对公共财政支出绩效审计进行系统的分析和探讨,并对其在实践中存在的问题加以规范。
So we need a system analysis and discuss on the public fiance performance audit. And we need to improve the existing the problem from practice.
其次根据目前网络安全审计中存在的问题提出了基于数据挖掘的网络安全审计系统的实现方案并建立了系统模型图。
Secondly, it puts forward a solution of network security audit based on data mining and builds a system model to solve the problems existing in current network security audit.
内部审计是现代企业制度中重要的内部控制系统。
Interior audit is an important control system within modern enterprise institution.
设计和实现了一个基于B/S&C/S混合模式的网络日志监控与安全审计系统原型,并对原型系统在实际应用环境中采集到的日志数据进行安全审计与分析。
The prototype of LSSAS in network based on B / S& C/ S mixing mode is designed and implemented, and the log data collected by prototype system in the applied environment are analyzed and audited.
设计和实现了一个基于B/S&C/S混合模式的网络日志监控与安全审计系统原型,并对原型系统在实际应用环境中采集到的日志数据进行安全审计与分析。
The prototype of LSSAS in network based on B / S& C/ S mixing mode is designed and implemented, and the log data collected by prototype system in the applied environment are analyzed and audited.
应用推荐