A lot of work has been done towards the higher security of information system, and many mature information system prototypes have been developed.
长期以来,人们针对信息系统的安全问题作了大量研究,已经有许多成熟的信息系统安全模型。
The category of the security of information system is classified. With each kind of attack principle analysed, the precaution measures and the solutions are brought up.
对信息系统安全种类进行了划分,对各种攻击原理进行了分析并提出了防范措施和解决方案。
Result: the investigation participated by 96 persons and 52 hospitals shows that the current situation on security of information system in hospitals is not satisfactory.
结果:通过对96人次52家医院的调查表明,目前医院信息系统在安全方面不尽人意。
In contrast, a system may require identifying information in order to handle matters such as security or quality of service.
相比而言,为了处理诸如安全或服务质量之类的事情,系统就需要标识信息了。
You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.
您也可以在得使您相信有人试图威胁系统安全的信息后,执行审计。
The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.
美国国土安全部需要了解商用电子绩效管理系统的实用性,用于其人力资源管理。
Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.
删除重要信息或破坏数据,提高系统安全行,对密码不符合要求的计算机在多次警告后阻断其连网。
Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.
所以单纯的信息安全意识培训,不足以弥补人在信息系统中的缺陷。
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
In network system there is a large amount of log audit data which contain much information related to security.
网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息。
So the establishment of a complete information security training system is the trend of The Times.
那么建立一个完整的信息安全培训体系就是大势所趋了。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.
具体而言,智慧城市可能遇到的信息安全问题分为网络安全、系统安全、数据安全和综合安全。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.
首先,介绍RFID系统的组成、工作原理并阐述了在RFID系统中针对电子标签信息安全性和隐私性的威胁。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
Based on our systemic model of information security, we design and implement a secure E-government information system.
基于我们提出的信息安全模型,设计并实现了一个基于该模型的电子政务信息安全系统。
It can provide total security service to the information system of client by digital certificate issued by ca authentication center.
通过CA认证中心发行的电子证书可以为用户提供信息安全的全面服务。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
In view of the security problems in hospital network information system, this paper puts forward a series of solutions.
针对医院网络信息系统中易出现的各种安全方面的问题,提出了一系列的解决方法。
The result of the research is beneficial to the research and design of the information security system.
研究结果对于信息安全系统的研究和设计具有一定参考价值。
The management of the user usually relates to the data security problem of the managing information system.
用户管理往往涉及到一个信息管理系统的数据安全问题。
The various elements that affect the security of network information system were analyzed. The feasible and practical solutions were put forward.
本文分析了计算机网络信息系统面临的各种不安全因素,并提出了切实可行的解决方案。
Intrusion detection is an essential component of information security protection system, which guarantees the security of the network resource.
入侵检测是信息安全保护体系中的一个重要组成部分,确保计算机网络资源的安全性。
The method can solve the question of the secret key security in larger system and provide a valuable guarantee system of information security.
该方法能够解决较大系统中密钥安全性的问题,提供了一个安全可行的信息安全保障体系。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
With the network's complexity increasing, the security of distributed information processing system has become more and more important.
随着网络复杂性的不断增加,分布式信息处理系统的安全性也越来越重要了。
The security of ERP information management system was considered firstly when the small and medium enterprises implemented ERP system.
ERP信息管理系统软件的安全性是中小型企业在实施ERP系统时必须考虑的问题。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
应用推荐