论述了从产品安全、网络安全和管理安全面性个层面实现证券信息系统安全运营的方法。
The author discusses the methods to realize safe running of security information system from aspects of product security, network security and management security.
尽管前者可以通过使用Kerberos (参见参考资料)和类似的网络安全协议完成,但是后者需要特殊的管理调优。
While the former can be accomplished via use of Kerberos (see Resources) and similar network security protocol, the latter requires special administrative tuning.
StrongPoint网络安全装置在交通管理系统和通信网络终端之间创造了一个安全的虚拟网络连接层。
The StrongPoint security appliance creates a secure, virtual-network layer connection between the traffic management system and the communications network endpoints.
StrongPoint网络安全装置在交通管理系统和通信网络终端之间创造了一个安全的虚拟网络连接层。
The StrongPoint security appliance creates a secure virtual-network layer connection between the traffic management system and the communications network endpoints.
对学校而言,除了加强对学生的日常管理,尤其应该加强和改善网络安全和文明教育。
For schools, in addition to strengthening the daily management of students, in particular, should strengthen and improve network security and civilization education.
至关重要的是,高级管理人员建立强大的网络安全是一种期望和沟通,在整个组织其下属的经理。
It is essential that senior management establish an expectation for strong cyber security and communicate this to their subordinate managers throughout the organization.
目录服务可以应用于信息发布、网络设备管理、网络应用管理和网络安全等各个方面。
Directory Service can be applied to information publication, network device management, network application management, network security and so on.
因此,可以广泛应用于信息发布、网络设备管理、网络应用管理和网络安全等各个方面。
Therefore, it can be applied to information published, network equipment management, network application management and network safety systems.
网络安全管理即指对大规模网络中数量众多、种类繁杂、动态变化的安全硬件、安全应用、安全事件的管理和控制。
To manage and control numerous, various, complicated, and dynamic security hardware, security applications and security events in the large-scope network is named network security management (NSM).
如何辨别防御与攻击和增强网络安全已成为网络运营商和技术管理人员、甚至普通网络用户研究的问题。
Howdistinguishes defense and attack and enhancing network security are the questions researched by network operation businessmen and technical management personnel, even ordinary network users.
网络安全日志管理中心由转换模块、统计分析模块和策略再配置模块组成。
Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.
可信网络架构安全模型是针对用户现有的网络安全资源进行有效整合和管理的。
The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.
“网络管理器”符合业界强制的NERC关键基础设施保护标准和国家电网网络安全性要求。
Network Manager meets industry mandated NERC Critical Infrastructure Protection Standards and National Grid cyber security requirements.
从规章制度、室内环境、软硬件、网络安全等方面简要阐述了对电子阅览室的管理和维护。
This paper briefly expounds the management and maintenance of E-reading room from aspects of the rules and regulations, indoor environment, software and hardware, and network security, etc.
因为它不同于传统网络,所以对用户接入管理和网络安全带来了新的质询。
Especially its mobility support lays a foundation for personal communication. The difference from traditional networks makes user management and network security great challenges in WMSN.
最后根据上述的校园建设方案从综合信息门户系统、用户管理及身份认证和校园数据中心网络安全三个方面具体介绍了实现过程。
At last introduce the implement of integration information main web, user management and identity authentication, network safety of data centre of campus construction.
结论系统主要实现了讨论和管理两大功能模块,且其中的言论过滤功能,满足了网络安全的需要。
CONCLUSION the system mainly include two modules: discuss and net manage. In order to meet the networking security, it also design the speech publishing filtrating function.
利用中心交换机的多种访问控制功能,可构建一个分布式的网络安全交换体系,以实现对网络和用户接入的安全管理。
The use of the multiple functions of switch in access-control can realize the distribution security system, and implement the security management for the network and the users.
因此加强网络安全建设和管理,是我们使用校园网络中不可回避的一个紧迫任务。
So we should strengthen the building and management of network safety, which is an urgent and inevitable task during our use of campus network.
实践结果证明,应用该算法和模型实施的风险评估对被评估单位的网络安全防护和管理工作起到了良好的指导作用。
The model is applied in security evaluation work and the practice result proves that the model and algorithm do a good directive function in network security protection and management.
目的是在集成化的网络安全系统中实现基于SNMP的网络安全管理和通信机制。
The purpose is to realize network security management and communications based on SNMP in the integrated network security System.
WSSNS从物理安全、系统安全、网络安全、应用安全和管理安全五个方面来实现涉密网的安全保护。
WSSNS realized the protection of secret - related network from five aspects: physics safety, system safety, network safety, application safety and management safety.
网络拓扑发现是通过收集网络传输的信息来研究网络连通结构的一项技术,在网络管理和网络安全评估发面具有重要意义。
Network topology discovery is a technology that research for network structure by collecting network transmission data, which is important in network management and network security evaluation.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
在网络安全方面,运用数字签名、CA认证和用户分级管理体系确保系统在网络运行中的安全性和网络传输的有效性。
As to network safety, digital signature, ca authentication and graded custom management have been applied to insure the safety and efficiency in the network running and transferring.
基于SSE - CMM评价体系,建立了网络安全管理平台的免疫和学习过程。
Immunity and study process of network security management platform was established base on SSE-CMM.
相应的网络信息安全的策略就要从环境安全、网络安全、信息安全和健全管理机制等方面考虑。
The according strategy for the security of Internet information should be considered from environment security, network security, information security, etc.
可以让用户以最小的安全分险和管理代价来管理网络,维护网络安全。
It can let user divide with minimum security dangerous managing cost manage the network, safeguard the online security.
该训练平台不仅可以进行在线实战时的检测和攻击,同时也可用于培养有实战经验的网络安全管理员。
This platform system can not only detect and attack in the case of actual combat, but also be used for training the administrator with actual combat experience.
本文针对传统PD M安全管理的缺点,建立了基于工作空间的权限管理模型和网络安全模型。
According to the shortcomings of the traditional PDM security management, this paper establishes a workspace-based authorization management model and a DPDM network security model.
应用推荐