公司管理环境下的信息安全风险。
Information security risk in the context of corporate governance.
本文针对信息安全风险评估进行阐述。
This paper describes the Security Risk Assessment of information.
由于信息安全风险评估不足,导致安全事件不断发生。
Because information safety risk assessment is insufficient, lead to security incidents occur repeatedly.
信息安全风险评估是考察信息系统安全性的一个重要环节。
This paper firstly provides the concept of the information security risk assessment.
信息安全风险评估是考察信息系统安全性的一个重要环节。
Research on the Theories and Key Technologies of Information System Security Evaluation;
对信息安全风险评估和系统风险的整体评价进行了理论归纳。
The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded.
实例分析表明,该模型可方便地应用于信息安全风险评估,具有实用性。
The study case of the assets value shows that the model can be easily used...
信息安全风险的来源包括(但并不限于)机构内部或者外部的人或硬件(图2)。
Sources of risk to information security include, but are not limited to, people or hardware within or outside the organization (Figure 2).
第三部分,论文着重研究了一种基于资产、威胁和弱点的信息安全风险评估量化模型。
In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.
在医疗领域,解决网络安全威胁的同时还要减少信息安全风险是一件非常具有挑战性的事情。
In the medical field, to solve the problem of network security threats while reducing the risk of information security is a very challenging thing.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
信息安全风险评估是保证信息系统安全保密的重要手段,是涉密信息系统风险管理的重要内容。
Information security risk assessment is an effective way to protect the security of secret-involved information system.
首先从信息安全风险评估的流程入手,着重叙述了信息安全风险评估过程中风险计算的原理和步骤。
At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.
相互依赖性是现阶段信息安全风险所具备的一个重要特征,网络中企业的信息安全决策会相互影响。
Based on the interdependence, which is an important characteristic of information security and the diversity of invasions, an investment game model is presented in this paper.
把效用函数引入信息安全风险领域,利用其反函数,定义绝对损失效应和相对损失效应,用以度量安全风险。
Utility function was introduced into security risk area, and its inverse function is used to define absolute loss effect and relative loss effect as measure of risk.
本文通过数学建模的手段,建立了基于ISO 27000系列标准的数字图书馆信息安全风险管理数学模型。
By means of mathematical modeling, this paper builds a general mathematical model of digital library information security risk management based on ISO 27000 series standards.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
传统的信息安全风险评估往往是一次性的,一般在项目实施之初进行安全风险的评估,用来指导安全设备的配备。
Traditional risk assessment is often once and for all, commonly performed at the beginning of a project to direct the configuration of security equipments.
根据一份最新报告显示,有将近96%的中国移动互联网用户已经面临信息安全风险,超过40%的用户已经“遭受了损失”。
Nearly 96 percent of Chinese mobile Internet users have been exposed to information security risks, and over 40 percent of them have "suffered losses," according to a new report.
阐述了信息安全风险评估所要解决的问题,介绍了目前在信息安全风险评估领域的主要方法,并对这些方法进行了分析和评价。
The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.
建立的信息安全风险评估体系采用BP神经网络方法,是一种非线性方法,不带有明显的主观成分和人为因素,使评价结果更有效、更客观。
BP neural network, the method is nonlinear method, is applied to risk assessment model of information security. The subjectivity and man-made is overcome. It's an effective method.
模型采用实际资产损失值表示信息安全风险值,依据模型所计算的信息安全风险损失值可直接作为企业决策者关于信息安全风险投资决策的依据。
The proposed model USES the real value to measure the loss of security risk, and the result can be used in the information security risk investments decision directly.
关于信息和相关风险分类的方案,以确保定义恰当的安全方法。
A scheme for classifying information and associated risks so that appropriate security measures can be defined.
有效的防控体系对于确保产品安全而言是必不可少的,而且在如何使风险最小化方面存在着大量信息。
Effective control systems are critical in ensuring product safety, and considerable information is available on how to minimize the risks.
大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。
Most of the compliance requirements (but not all) involve information security and the associated business risk.
总的来说,你的网上操作——网络社交、云信息处理等——越多,你的隐私和安全所受风险则越大。
In general, the more you do online - social networking, cloud computing etc - the more your privacy and security are at risk.
组织企业的安全管理,信息技术管理以及风险管理功能,以提高信息的有效交换及企业知识的提升。
Organize enterprise security management, it management, and risk management functions to promote efficient exchange of information and leverage corporate knowledge.
组织企业的安全管理,信息技术管理以及风险管理功能,以提高信息的有效交换及企业知识的提升。
Organize enterprise security management, it management, and risk management functions to promote efficient exchange of information and leverage corporate knowledge.
应用推荐