The category of the security of information system is classified. With each kind of attack principle analysed, the precaution measures and the solutions are brought up.
对信息系统安全种类进行了划分,对各种攻击原理进行了分析并提出了防范措施和解决方案。
The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.
美国国土安全部需要了解商用电子绩效管理系统的实用性,用于其人力资源管理。
You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.
您也可以在得使您相信有人试图威胁系统安全的信息后,执行审计。
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.
所以单纯的信息安全意识培训,不足以弥补人在信息系统中的缺陷。
Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.
删除重要信息或破坏数据,提高系统安全行,对密码不符合要求的计算机在多次警告后阻断其连网。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.
具体而言,智慧城市可能遇到的信息安全问题分为网络安全、系统安全、数据安全和综合安全。
So the establishment of a complete information security training system is the trend of The Times.
那么建立一个完整的信息安全培训体系就是大势所趋了。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.
首先,介绍RFID系统的组成、工作原理并阐述了在RFID系统中针对电子标签信息安全性和隐私性的威胁。
It can provide total security service to the information system of client by digital certificate issued by ca authentication center.
通过CA认证中心发行的电子证书可以为用户提供信息安全的全面服务。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
In the application of CSCW System, the security for information is critically concerned by users.
在CSCW系统的应用中,用户对于信息的安全性提出了很严格的要求。
In view of the security problems in hospital network information system, this paper puts forward a series of solutions.
针对医院网络信息系统中易出现的各种安全方面的问题,提出了一系列的解决方法。
The article depicts in detail about the content of the information security management system and its establishing methods approaches.
比较详细地介绍信息安全管理体系的内容和构建信息安全管理的方法和途径。
The minimum information state indicates the information state reflects the security, reliability and economy of power supply system.
能够表证供电系统安全、可靠、质量、经济性能的信息状态称为最小信息状态。
This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.
本文论述了信息系统的表现形态和系统结构,并分析了信息系统面临的安全风险。
Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.
就信息资源保护的需求现状,分析了当前网络信息安全通常采用的技术以及身份验证技术现状。
The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.
企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制和管理控制。
The security of ERP information management system was considered firstly when the small and medium enterprises implemented ERP system.
ERP信息管理系统软件的安全性是中小型企业在实施ERP系统时必须考虑的问题。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
As the data and information primary storage mode, the security of the database is an important part of accounting information system.
在会计信息系统中,数据库作为数据和信息的主要存储方式,其安全控制问题是系统构建的关键。
This paper, based on the status of the information security of the digital library, analyzed the problems of the information system and presented the factors that influence the information security.
本文结合数字图书馆的信息安全现状,对数字图书馆的信息安全问题和影响数字图书馆信息安全的因素做了详细的分析。
With the network's complexity increasing, the security of distributed information processing system has become more and more important.
随着网络复杂性的不断增加,分布式信息处理系统的安全性也越来越重要了。
A lot of work has been done towards the higher security of information system, and many mature information system prototypes have been developed.
长期以来,人们针对信息系统的安全问题作了大量研究,已经有许多成熟的信息系统安全模型。
应用推荐