Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.
具体而言,智慧城市可能遇到的信息安全问题分为网络安全、系统安全、数据安全和综合安全。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
Intrusion Detection System, new domain of Network Security, is a core research area in dynamic Information Security, but it still has many problems, especially in self-completing and self-learning.
入侵检测系统是目前安全领域较新课题,是动态安全领域的核心,但目前仍然存在很多问题,特别是具有自适应能力、能自我学习的入侵检测系统还不完善。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
Function of security kernel is to maintain security of information inside system.
安全内核的功能是维护系统内部信息的安全。
Information security framework system is the basic approach of information security management.
架构信息安全体系是信息安全管理的基本方法。
This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.
该文从论述计算机系统的信息安全问题的重要性出发,重点探讨了影响计算机信息网络安全的因素和防范对策。
The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.
企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制和管理控制。
The method can solve the question of the secret key security in larger system and provide a valuable guarantee system of information security.
该方法能够解决较大系统中密钥安全性的问题,提供了一个安全可行的信息安全保障体系。
The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.
主要研究了网络与信息安全原型系统中的关键技术,介绍了网络与信息安全测试平台的组成,阐述了测试方法。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.
方法针对医疗信息的各项安全要求进行理论分析,构建安全远程医疗系统模型结果。
This paper, based on the status of the information security of the digital library, analyzed the problems of the information system and presented the factors that influence the information security.
本文结合数字图书馆的信息安全现状,对数字图书馆的信息安全问题和影响数字图书馆信息安全的因素做了详细的分析。
The first chapter emphasizes on the importance of information system security. It introduces modern security management theories and the BS7799 security management standard.
第一章重点阐述信息安全管理的重要性,介绍现代安全管理思想,引入国外的BS 7799安全管理标准。
The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.
论述了信息安全基础:安全标准,安全表述模型,网络安全体系结构:几种典型的安全技术。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.
因此,本文主要分为两个重要的组成部分:信息系统的风险分析和管理过程及基于RBAC的安全模型设计。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
The security of operating system is an important aspect of information security.
操作系统安全是信息安全的一个重要方向。
Conclusion Intranet security management system can effectively guarantee information security of hospital Intranet and greatly improve work efficiency of network maintenance personnel.
结论内网安全管理系统能够有效的保障医院内网信息安全和大幅提高网络维护人员的工作效率。
Intrusion detection is an essential component of information security protection system, which guarantees the security of the network resource.
入侵检测是信息安全保护体系中的一个重要组成部分,确保计算机网络资源的安全性。
Based on the methods of network security counting and combined with the feature for wideband community information server, a security counting system is designed in this paper.
在现有网络安全计费方法的基础上,结合宽带社区信息服务的特点,设计一种基于社区信息服务的安全计费集成系统。
Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.
隐通道以一种违背系统安全策略的方式泄露秘密信息,对系统安全造成很大威胁。
Platform system SecurityPlatform system security is the base of the platform security, and gives strongly support to platform information security.
平台系统安全是整个平台安全的基础,为平台信息安全提供了有力的支持。
It will greatly assure the national information system security to construct and normalize the national information on the basis of constructing the information system security frame.
从构建信息系统安全架构的高度出发来全面构建和规范我国的信息安全,将有效的保障我国的信息系统安全。
This article discusses the algorithm, system flow and security of PGP. Later, aiming at the product design information and its security demand of transfer, we applied PGP for examples.
系统地讨论PGP加密系统的算法、系统流程和安全性。并针对产品设计信息及其传输安全性要求,应用了PGP。
The design principle, system design and security strategy of integrative information security and protection architecture are discussed.
以及一体化信息安全防护体系的设计原则、系数设计、管理上的安全策略。
The paper also presents the layout of security safeguard system of information system and discusses implement policy of security safeguard system of information system.
本文还给出了信息系统安全保障体系的规划方式,构建信息系统安全保障体系实施策略。
The paper also presents the layout of security safeguard system of information system and discusses implement policy of security safeguard system of information system.
本文还给出了信息系统安全保障体系的规划方式,构建信息系统安全保障体系实施策略。
应用推荐