• The category of the security of information system is classified. With each kind of attack principle analysed, the precaution measures and the solutions are brought up.

    信息系统安全种类进行划分各种攻击原理进行了分析并提出防范措施解决方案

    youdao

  • The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.

    美国国土安全部需要了解商用电子绩效管理系统实用性用于人力资源管理。

    youdao

  • You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.

    可以使相信有人试图威胁系统安全信息后,执行审计

    youdao

  • Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.

    操作系统安全与否直接决定着信息是否安全因而系统文件系统安全方面在系统资源使用方面的控制就变得越来越重要

    youdao

  • Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.

    所以单纯信息安全意识培训不足以弥补人信息系统中的缺陷。

    youdao

  • Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.

    删除重要信息破坏数据提高系统安全行,密码符合要求计算机多次警告阻断连网

    youdao

  • Consider the effectiveness of the company's internal control system, including information technology security and control.

    评价公司内部控制系统有效性包括信息技术安全和控制。

    youdao

  • Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.

    具体而言智慧城市可能遇到信息安全问题分为网络安全、系统安全、数据安全和综合安全。

    youdao

  • So the establishment of a complete information security training system is the trend of The Times.

    那么建立一个完整信息安全培训体系就是大势所趋了。

    youdao

  • All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.

    这些导致企业无法成熟IT信息安全技术直接应用于工业控制系统信息安全保护

    youdao

  • Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.

    网络安全目前信息系统应用重要研究方向如何确定用户身份控制用户对信息资源的访问,是其中的一个重要问题。

    youdao

  • This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.

    文中介绍了信息融合概念功能模型以及安全审计系统组成功能

    youdao

  • First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.

    首先介绍RFID系统组成、工作原理阐述了RFID系统中针对电子标签信息安全性隐私性威胁

    youdao

  • It can provide total security service to the information system of client by digital certificate issued by ca authentication center.

    通过CA认证中心发行电子证书可以用户提供信息安全全面服务

    youdao

  • After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.

    信息系统第三测试完成业务单位完成信息系统安全等级保护备案测评整改工作

    youdao

  • The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.

    通过设置密码蓝牙技术安全机制提供信息家电网络远程控制系统的安全保障

    youdao

  • In the application of CSCW System, the security for information is critically concerned by users.

    CSCW系统应用中,用户对于信息安全性提出了严格的要求。

    youdao

  • In view of the security problems in hospital network information system, this paper puts forward a series of solutions.

    针对医院网络信息系统中易出现各种安全方面问题提出一系列解决方法

    youdao

  • The article depicts in detail about the content of the information security management system and its establishing methods approaches.

    比较详细地介绍信息安全管理体系内容构建信息安全管理的方法和途径

    youdao

  • The minimum information state indicates the information state reflects the security, reliability and economy of power supply system.

    能够表证供电系统安全可靠、质量、经济性能信息状态称为最小信息状态。

    youdao

  • This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.

    本文论述了信息系统表现形态系统结构分析了信息系统面临安全风险

    youdao

  • Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.

    信息资源保护需求现状分析了当前网络信息安全通常采用技术以及身份验证技术现状。

    youdao

  • The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.

    企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制管理控制。

    youdao

  • The security of ERP information management system was considered firstly when the small and medium enterprises implemented ERP system.

    ERP信息管理系统软件安全性中小型企业实施ERP系统必须考虑的问题。

    youdao

  • The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.

    操作系统安全信息系统安全基石访问控制则是操作系统安全机制重要内容。

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • As the data and information primary storage mode, the security of the database is an important part of accounting information system.

    会计信息系统数据库作为数据信息主要存储方式安全控制问题系统构建的关键

    youdao

  • This paper, based on the status of the information security of the digital library, analyzed the problems of the information system and presented the factors that influence the information security.

    本文结合数字图书馆信息安全现状,对数字图书馆的信息安全问题影响数字图书馆信息安全因素了详细分析

    youdao

  • With the network's complexity increasing, the security of distributed information processing system has become more and more important.

    随着网络复杂性不断增加分布式信息处理系统安全性越来越重要了。

    youdao

  • A lot of work has been done towards the higher security of information system, and many mature information system prototypes have been developed.

    长期以来,人们针对信息系统安全问题作了大量研究已经许多成熟的信息系统安全模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定