Have Your Bank Personalize Your Security controls?
让你的银行提供个人化的安全措施。
SO far we've looked at security controls that are outside the SOAP protocols.
目前我们所考察的安全控制都在SOAP协议之外。
Now it's time to use the security controls that are available in ASP.NET 2.0.
现在是使用ASP.NET2.0中安全控件的时候了。
Duties for network and security controls of virtual machines may not be well separated.
对虚拟机的网络和安全控制职责可能没有很好地分隔。
Portal security controls the level of access to all the portal resources, including content.
门户安全性控制所有门户资源(包括内容)的访问级别。
After you apply security controls, you may have remaining risks, also known as residual risks.
应用了安全控制之后,可能依旧存有风险,这也称为残余风险。
Security controls for most resources are applied based on group membership and user attributes.
对于大多数资源,安全性是根据组成员身份和用户属性应用的。
Include in the plan the residual risks, the remaining risks after security controls have been applied.
在这个计划中,应包含残余风险,即应用了安全控制后仍存在的风险。
Obtain manufacturers information regarding their security controls via a protected Internet system.
经由一个加保护的因特网系统获得有关制造厂商安全控制的信息。
One of the key challenges of enterprise systems is properly implementing strong system security controls.
企业系统的主要挑战之一就是恰当地实现强系统安全控制。
You may need to change security controls or update the application to reduce the number of residual high risks.
您可能需要修改安全控制或更新应用程序,以降低残余的高风险的数量。
TIP: For more precise security controls, you can narrow the security further by using the following COM + role and user instead.
提示:要获取更精确的安全控制,可以通过使用下面的COM +角色和用户进一步缩小安全性。
Arce: Is there anything to say in that regard in terms of internal technologies and security controls that may or may not apply?
Arce:对于哪些些技术适合与企业内部的安全控制,哪些不适合,有什么可以谈谈的吗?
Electric, two-way hydraulic output, electromagnetic remote control to change, security controls, safe and convenient operation.
电动、双向油压输出,电磁遥控换向,安全控制按钮,操作安全方便。
AIXPert is not a single system or utility; in actuality, it is a system that centralizes many security controls within one interface.
AIXPert不是一个单独的系统或实用程序;实际上,它是一个将很多安全工具集中到一个界面的系统。
But over the last few years I have seen a remarkable rise in security controls deployed in the field along with renewed customer interest.
但就在最近几年,我看到了这个领域中部署的安全控制显著增长,客户对安全的兴趣也日渐浓厚。
Risk analysis is a method of identifying risks and assessing potential damages that could occur to justify security controls and safeguards.
风险分析是一种标识风险和评估可能会出现的潜在损失的方法,用于为安全控制和保障措施提供依据。
Such issues constitute a control challenge because tried and tested network-level security controls might not work in a given cloud environment.
这些问题构成了一个控制的挑战,因为基于尝试和测试的网络级安全控制在一个给定的云环境中可能无法正常工作。
An investigation into February's attack revealed that the cyberthieves won access to the central bank network because of poor security controls.
对二月份孟加拉国央行失窃事件的调查显示,由于糟糕的安全控制系统,窃贼才得以进入央行网络系统。
The security controls deployed for LotusLive provide privacy and controlled authorization to sensitive information while enabling business operations.
为LotusLive部署的安全控件为敏感信息提供隐私和可控授权,同时支持业务操作。
After you get the answers, determine which security controls the provider cannot provide to mitigate the high and medium risks to more acceptable levels.
得到这些答案后,确定哪些安全控制是服务提供商无法提供的,从而将高等和中等程度的风险降至一个可接受的范围。
All external and internal Windows, gates, and fences are secured with locks. Company Management or security controls the issuance of locks and keys.
所有的内外门、窗和栅栏都是用锁来确保安全的。公司的管理部门和安保部门则是确保这些锁和钥匙的安全。
TIP: For more precise security controls, you can narrow the security further by using the following COM+ roles and users instead of the ones that I listed above
提示:要进行更精确的控制,可以通过使用以下COM+角色和用户替代上述角色和用户,进一步缩小安全性
Insufficient network-based controls in virtualized networks occur when security controls that work on network level may not work in an IaaS network infrastructure.
如果网络级的安全控制在IaaS网络基础设施中无效,就会出现在虚拟化网络中基于网络的控制不足。
The security controls presented align with NIST special publication 800-53 Revision 3, Recommended security controls for Federal Information Systems and organizations.
这份安全管理是基于NIST特殊发表刊物800-53Revision3,联邦信息系统和组织的安全管理建议。
This should ensure that security controls remain in place and continue to be effective even among changes to the energy-delivery system or emerging threats, according to the DOE.
应当确保安全控制各就各位,即使能源输送系统发生变化或受到威胁,也要保持有效运转。
As we noted earlier, this abstraction layer also complicates the use of advanced security controls, such as hardware security modules, possibly leading to poor key management procedures.
我们前面也提到了,这个抽象层还让先进的安全控制——像是硬件安全模块——的使用更加复杂,结果就可能是蹩脚的密钥管理程序。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
应用推荐