换句话说,日常的密码政策的执行不是治理,而仅仅是密码管理。
On the other hand, the day-to-day execution of the password policies is not governance, but simply password management.
举例来说,要满足公司的安全需求,IT组织要创建并实现密码政策。
For example, to meet corporate security needs, an it organization is tasked with creating and implementing a password policy.
一种实例性的密码政策可以包括对密码的长度和密码所用字母的要求,更改密码的频率以及允许登录错误的次数。
An example password policy would include requirements for the length and characters used in the password, how frequently they must be changed, and the number of failed login attempts allowed.
国外有关电子商务的安全技术,虽然其结构或加密技术等都不错,但受到了外国密码政策的限制,因此强度普遍不够。
Abroad one-commerce security technology, although its structure or encryption technology is good, but is limited by the foreign password policy, so the strength of the common enough.
这个计算机黑客突然碰壁了,因这家公司实行了用密码保存公司纪录的政策。
The hacker came smack up against the company's policy of keeping its records in code.
这方面的政策还可以要求设定复杂的密码以及设置安全功能,如在多次密码输入错误后可自动抹除设备上的数据。
Policies can also force strong passwords and set security features such as the number of times a password attempt can fail before the device wipes its data.
大多数组织有安全专家,他们要求更强大的政策,但是其中只有一些有易用性的必要以使之不过于强调密码的复杂性。
"Most organizations have security professionals who demand stronger policies, but only some have usability imperatives strong enough to push back," the authors add.
登录失败:用户帐户限制。可能的原因是不允许空白密码,登录时间限制,或限制政策已被强迫。
Logon failure: user account restriction. Possible reasons are blank passwords not allowed, logon hour restrictions, or a policy restriction has been enforced.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
这些政策可以包括密码验证,正式的安全审核,使用跟踪,无线设备的使用,有关可移动媒体的关注,个人应用的限制和用户培训。
Policies may include password requirements, formal security audits, usage tracking, wireless device usage, removable media concerns, personal use limitations, and user training.
这些政策可以包括密码验证,正式的安全审核,使用跟踪,无线设备的使用,有关可移动媒体的关注,个人应用的限制和用户培训。
Policies may include password requirements, formal security audits, usage tracking, wireless device usage, removable media concerns, personal use limitations, and user training.
应用推荐