Now covert channel analysis is the main bottleneck of development of security information system with high security level in our country.
目前,隐蔽通道分析是阻碍我国开发高安全等级信息系统的主要瓶颈。
In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.
本文通过CORBA中间件技术,来实现基于策略的安全信息系统,从而解决这一棘手问题。
The author discusses the methods to realize safe running of security information system from aspects of product security, network security and management security.
论述了从产品安全、网络安全和管理安全面性个层面实现证券信息系统安全运营的方法。
In contrast, a system may require identifying information in order to handle matters such as security or quality of service.
相比而言,为了处理诸如安全或服务质量之类的事情,系统就需要标识信息了。
But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.
但是安全专家警告说攻击者可以利用他们在系统中的立足点偷窃用户和客户的信用卡账号和个人信息。
The server's security system validates the user against its security registry and obtains other security information about the user.
服务器的安全系统将针对安全注册中心对用户进行验证并获得关于用户的安全信息。
You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.
您也可以在得使您相信有人试图威胁系统安全的信息后,执行审计。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
To coordinate the building of state information security protection system;
协调国家信息安全保障体系建设;
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.
操作系统确认bob/bobpsw组合是否有效,把该信息返回给安全插件。
Using WS-Security, the credit card information can instead be sent in encrypted form that can be decrypted only by the banking system that issues the payment confirmation.
使用WS-Security,信用卡信息可以以加密的格式传递,并且仅能由发出付款确认的银行系统解密。
The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.
美国国土安全部需要了解商用电子绩效管理系统的实用性,用于其人力资源管理。
Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.
删除重要信息或破坏数据,提高系统安全行,对密码不符合要求的计算机在多次警告后阻断其连网。
Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.
所以单纯的信息安全意识培训,不足以弥补人在信息系统中的缺陷。
So the establishment of a complete information security training system is the trend of The Times.
那么建立一个完整的信息安全培训体系就是大势所趋了。
Based on our systemic model of information security, we design an electronic seal system.
基于我们提出的信息安全模型,设计了电子印章系统。
The adoption of an information security management system is a strategic decision for an organization.
采用信息安全管理体系是组织的一项战略性决策。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.
本文介绍的安全电子邮件系统通过信息安全技术对传统的电子邮件系统进行扩展和完善。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.
具体而言,智慧城市可能遇到的信息安全问题分为网络安全、系统安全、数据安全和综合安全。
Ensuring power system security by networking transmission of electric power information.
电力信息的网络化传输是电力系统安全的重要保证。
First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.
首先,介绍RFID系统的组成、工作原理并阐述了在RFID系统中针对电子标签信息安全性和隐私性的威胁。
Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.
通过研究,本文对陕鼓信息系统安全管理有指导作用,对制造型企业信息系统安全管理有借鉴作用。
This International Standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system.
本标准用于为建立、实施、保持和持续改进信息安全管理体系提供要求。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
Certified Information System Security professional.
信息系统安全专家认证。
Certified Information System Security professional.
信息系统安全专家认证。
应用推荐