受试者的数据是匿名的,但是可以通过一个保密电子信息系统跟其家庭成员获得联系。
Patient data are anonymous, but the families can be contacted through a secure electronic-messaging system.
对非保密的计算机信息系统来说,其攻击成功率达88%,被查出的仅占5%。
For non confidential computer information system, the attack success rate of 88%, was found only accounted for 5%.
CIA三部曲是广泛使用的信息保证(Information Assurance,IA)模型,此模型将保密性、完整性和可用性定义为所有信息系统的基础安全特征。
The CIA triad is a widely used information assurance (ia) model that identifies confidentiality, integrity, and availability as the fundamental security characteristics of all information systems.
信息系统中的安全性问题主要包含身份认证服务、访问控制服务、数据保密服务、数据完整牲服务和不可否认服务等几个方面。
The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.
涉密信息系统应当按照国家保密标准配备保密设施、设备。
Secrecy facilities and equipment shall be provided for a secret-related information system according to the state secrecy standards.
因此应该加强网络信息的安全与保密意识,并采取各种有利的防范举措,以保障网络信息系统的安全运行。
So it is necessary for us to strengthen the security and secrecy consciousness, and take measures to carry out propaganda, education and training of information protection.
对于信息系统的安全性一般包括:数据完整性、数据保密性、身份确认和认证、访问控制、不可否认性等几个方面。
The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.
阐述了基于C/S和B/S模式的企业管理信息系统的设计过程,如设计原则、系统结构、系统配置、系统功能设计、安全保密技术等。
The paper illustrater the design procedure of management information system based on C/S and B/S, including its design principle, system infrastructure, configuration, functions and securities.
一个安全的网络信息系统应当确保所传输信息的完整性、保密性、不可否认性等。
A secure network information system should ensure integrity, confidentiality and non-reputation of the transmitted data.
信息安全风险评估是保证信息系统安全保密的重要手段,是涉密信息系统风险管理的重要内容。
Information security risk assessment is an effective way to protect the security of secret-involved information system.
信息安全风险评估是保证信息系统安全保密的重要手段,是涉密信息系统风险管理的重要内容。
Information security risk assessment is an effective way to protect the security of secret-involved information system.
应用推荐