论文选择层次分析方法来确定各评估指标的权重,利用灰色系统评价法对我国商业银行信息安全的风险进行综合评估。
The paper selected Analytic Hierarchy Process to determine the weight of each assessment index, and then used Grey Appraisal Process to assess risk value.
通过对调研所得数据进行收集、归纳、比较和分析,本文提出了基于ISO 27000的针对复合图书馆信息安全的风险评估实施模型。
According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.
大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。
Most of the compliance requirements (but not all) involve information security and the associated business risk.
有效的防控体系对于确保产品安全而言是必不可少的,而且在如何使风险最小化方面存在着大量信息。
Effective control systems are critical in ensuring product safety, and considerable information is available on how to minimize the risks.
关于信息和相关风险分类的方案,以确保定义恰当的安全方法。
A scheme for classifying information and associated risks so that appropriate security measures can be defined.
总的来说,你的网上操作——网络社交、云信息处理等——越多,你的隐私和安全所受风险则越大。
In general, the more you do online - social networking, cloud computing etc - the more your privacy and security are at risk.
组织企业的安全管理,信息技术管理以及风险管理功能,以提高信息的有效交换及企业知识的提升。
Organize enterprise security management, it management, and risk management functions to promote efficient exchange of information and leverage corporate knowledge.
信息安全风险的来源包括(但并不限于)机构内部或者外部的人或硬件(图2)。
Sources of risk to information security include, but are not limited to, people or hardware within or outside the organization (Figure 2).
公司管理环境下的信息安全风险。
Information security risk in the context of corporate governance.
戴姆勒—克莱斯勒股份公司对这些网站所包含的信息或其安全性在任何方面均不承担责任,您使用这些链接时须风险自负。
DaimlerChrysler is not in any way responsible for the information contained on those sites or their security and you use these links at your own risk.
应买方要求并由其承担风险和费用,在需要办理清关手续时,卖方必须提供由其占有的对办理货物安全许可必需的信息。
Where applicable, the seller must provide, at the buyer's request, risk and expense, any information in the possession of the seller that is required for the security clearance of the goods.
在医疗领域,解决网络安全威胁的同时还要减少信息安全风险是一件非常具有挑战性的事情。
In the medical field, to solve the problem of network security threats while reducing the risk of information security is a very challenging thing.
根据一份最新报告显示,有将近96%的中国移动互联网用户已经面临信息安全风险,超过40%的用户已经“遭受了损失”。
Nearly 96 percent of Chinese mobile Internet users have been exposed to information security risks, and over 40 percent of them have "suffered losses," according to a new report.
不少企业都会举办信息安全培训,希望提高员工的信息安全意识,减少因员工失误所造成的安全风险。
Many companies will organize information security training, hoping to improve employee awareness of information security, reduce security risks caused by employee errors.
此外,有兴趣的团体或人士可就用途、暴露风险以及更安全的替代物质或技术提出进一步的信息。
In addition, interested parties can provide comments and further information on the USES, exposures and availability of safer alternative substances or techniques.
某些没有前瞻性风险管理计划的信息安全组可能依赖于恐惧来推动组织。
Some Information Security Groups without a proactive risk management program may rely on fear to motivate the organization.
风险评估是信息系统安全保证的关键技术。
Risk assessment as one of the core technologies ensures it system security.
第三部分,论文着重研究了一种基于资产、威胁和弱点的信息安全风险评估量化模型。
In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.
传统的风险评估中,大粒度的评估结果不能给安全管理员提供切实有用的信息。
For the conventional security risk assessment, the results by large granularity assessment can't provide security administrators with much effective and applicable information.
但这个软件巨人辩称假冒程序给信息安全造成更大的风险。
But the software giant argues that counterfeit programs pose a far greater risk to information security.
首先从信息安全风险评估的流程入手,着重叙述了信息安全风险评估过程中风险计算的原理和步骤。
At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.
会计信息系统电算化为单位带来效益的同时,也带来了与信息系统的安全性、可靠性相关的风险。
Computerization of accounting information system brings many benefits for organizations. It can also bring the relevant risk to its security and reliability.
本文将基于风险评估技术的主动防御策略引入电力信息网络的安全防护中。
This paper introduces the active defense policy based on risk assessment technology into safe protection of electric power information network.
本文论述了信息系统的表现形态和系统结构,并分析了信息系统面临的安全风险。
This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.
而风险评估作为信息安全管理的一个重要环节,对保障企事业的基础信息系统安全有着非常重要的作用。
As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.
正在考虑创建一所新的大学校园,你们的任务是对这所大学的信息技术(IT)安全性的风险评估建立模型。
The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.
然而对信息安全的解决方案常常采用被动的方式,发现什么地方可能有风险,有安全问题,则采取对应的安全技术来解决。
But the information security solution adopted is often passive, which means that the security risk or problems have once be found, people only adopt the corresponding security technology to solve.
然而对信息安全的解决方案常常采用被动的方式,发现什么地方可能有风险,有安全问题,则采取对应的安全技术来解决。
But the information security solution adopted is often passive, which means that the security risk or problems have once be found, people only adopt the corresponding security technology to solve.
应用推荐