• Now covert channel analysis is the main bottleneck of development of security information system with high security level in our country.

    目前隐蔽通道分析阻碍我国开发安全等级信息系统主要瓶颈

    youdao

  • In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.

    本文通过CORBA中间件技术实现基于策略安全信息系统从而解决棘手问题。

    youdao

  • The author discusses the methods to realize safe running of security information system from aspects of product security, network security and management security.

    论述产品安全网络安全和管理安全面性个层面实现证券信息系统安全运营方法

    youdao

  • In contrast, a system may require identifying information in order to handle matters such as security or quality of service.

    相比而言,为了处理诸如安全服务质量之类事情系统需要标识信息了。

    youdao

  • But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.

    但是安全专家警告攻击者可以利用他们系统中的立足点偷窃用户客户信用卡账号个人信息。

    youdao

  • The server's security system validates the user against its security registry and obtains other security information about the user.

    服务器安全系统针对安全注册中心用户进行验证获得关于用户的安全信息

    youdao

  • You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.

    可以使相信有人试图威胁系统安全信息后,执行审计

    youdao

  • For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.

    有关如何使用registrySYSTE m属性控制用户登录更多信息阅读AIX安全指南”和参考资料部分所列出文章

    youdao

  • To coordinate the building of state information security protection system;

    协调国家信息安全保障体系建设

    youdao

  • Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.

    同样如果系统侵入并受到破坏,那么数据库数据库访问信息存储正在运行Web服务器机器上会引发安全性问题

    youdao

  • The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.

    操作系统确认bob/bobpsw组合是否有效,把信息返回安全插件

    youdao

  • Using WS-Security, the credit card information can instead be sent in encrypted form that can be decrypted only by the banking system that issues the payment confirmation.

    使用WS-Security信用卡信息可以加密的格式传递,并且发出付款确认银行系统解密

    youdao

  • The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.

    美国国土安全部需要了解商用电子绩效管理系统实用性用于人力资源管理。

    youdao

  • Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.

    删除重要信息破坏数据提高系统安全行,密码符合要求计算机多次警告阻断连网

    youdao

  • Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.

    所以单纯信息安全意识培训不足以弥补人信息系统中的缺陷。

    youdao

  • So the establishment of a complete information security training system is the trend of The Times.

    那么建立一个完整信息安全培训体系就是大势所趋了。

    youdao

  • Based on our systemic model of information security, we design an electronic seal system.

    基于我们提出信息安全模型设计电子印章系统

    youdao

  • The adoption of an information security management system is a strategic decision for an organization.

    采用信息安全管理体系组织一项战略性决策

    youdao

  • The information security guarantee system framework can be divided into the security management framework and the security technology framework.

    为了系统地、完整地构建企业信息安全保障体系,考虑技术体系管理体系共同构建。

    youdao

  • The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.

    本文介绍安全电子邮件系统通过信息安全技术传统的电子邮件系统进行扩展完善。

    youdao

  • All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.

    这些导致企业无法成熟IT信息安全技术直接应用于工业控制系统信息安全保护

    youdao

  • Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.

    具体而言智慧城市可能遇到信息安全问题分为网络安全、系统安全、数据安全和综合安全。

    youdao

  • Ensuring power system security by networking transmission of electric power information.

    电力信息网络化传输电力系统安全重要保证

    youdao

  • First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.

    首先介绍RFID系统组成、工作原理阐述了RFID系统中针对电子标签信息安全性隐私性威胁

    youdao

  • Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.

    通过研究本文信息系统安全管理指导作用,对制造企业信息系统安全管理借鉴作用

    youdao

  • This International Standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system.

    标准用于为建立实施保持持续改进信息安全管理体系提供要求

    youdao

  • After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.

    信息系统第三测试完成业务单位完成信息系统安全等级保护备案测评整改工作

    youdao

  • Certified Information System Security professional.

    信息系统安全专家认证

    youdao

  • Certified Information System Security professional.

    信息系统安全专家认证

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定