The security of information system is vital.
信息系统的安全是至关重要的。
Computer virus is a great threat to the security of information system.
计算机病毒是信息系统安全的大敌之一。
Employ various security tools to monitor the security of information system.
使用各种各样的安全工具监测信息系统安全。
The category of the security of information system is classified. With each kind of attack principle analysed, the precaution measures and the solutions are brought up.
对信息系统安全种类进行了划分,对各种攻击原理进行了分析并提出了防范措施和解决方案。
The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.
美国国土安全部需要了解商用电子绩效管理系统的实用性,用于其人力资源管理。
You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.
您也可以在得使您相信有人试图威胁系统安全的信息后,执行审计。
To coordinate the building of state information security protection system;
协调国家信息安全保障体系建设;
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.
所以单纯的信息安全意识培训,不足以弥补人在信息系统中的缺陷。
Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.
删除重要信息或破坏数据,提高系统安全行,对密码不符合要求的计算机在多次警告后阻断其连网。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.
具体而言,智慧城市可能遇到的信息安全问题分为网络安全、系统安全、数据安全和综合安全。
So the establishment of a complete information security training system is the trend of The Times.
那么建立一个完整的信息安全培训体系就是大势所趋了。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
The adoption of an information security management system is a strategic decision for an organization.
采用信息安全管理体系是组织的一项战略性决策。
First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.
首先,介绍RFID系统的组成、工作原理并阐述了在RFID系统中针对电子标签信息安全性和隐私性的威胁。
It can provide total security service to the information system of client by digital certificate issued by ca authentication center.
通过CA认证中心发行的电子证书可以为用户提供信息安全的全面服务。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
A novel approach to the security evaluation of information system is presented.
提出了一种新颖的安全评估方法。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
Information security framework system is the basic approach of information security management.
架构信息安全体系是信息安全管理的基本方法。
In the application of CSCW System, the security for information is critically concerned by users.
在CSCW系统的应用中,用户对于信息的安全性提出了很严格的要求。
The article depicts in detail about the content of the information security management system and its establishing methods approaches.
比较详细地介绍信息安全管理体系的内容和构建信息安全管理的方法和途径。
This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.
本文论述了信息系统的表现形态和系统结构,并分析了信息系统面临的安全风险。
Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.
就信息资源保护的需求现状,分析了当前网络信息安全通常采用的技术以及身份验证技术现状。
The security of ERP information management system was considered firstly when the small and medium enterprises implemented ERP system.
ERP信息管理系统软件的安全性是中小型企业在实施ERP系统时必须考虑的问题。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
As the data and information primary storage mode, the security of the database is an important part of accounting information system.
在会计信息系统中,数据库作为数据和信息的主要存储方式,其安全控制问题是系统构建的关键。
应用推荐