另外,首席安全官或首席信息官可能需要表述和控制其他业务指示。
There are other businesses directives that a Chief Security Officer or a Chief Information Officer might need to express and control.
文档控制和安全:目的是为了管理以业务为主的信息的访问以及使用数字签名验证文档的真实性。
Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。
It also contains security namespace information and access control policies on all the Cognos objects.
本文将向您介绍如何在TechnologyExplorer中使用db2auth安全插件来控制db2的用户和组身份验证(参见参考资料了解db2auth的详细信息)。
This article teaches you how the Technology Explorer can control user and group authentication to db2 through the use of a security plug-in called db2auth (see Resources for more about db2auth).
全局变量的另一重要方面是,当考虑到信息安全问题时,可以控制对信息的访问。
Another important aspect of global variables is that when security of the information is an issue, controlling access is possible.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
规则控制了如何安全地进行专门化:每种新的信息类型必须映射到一个已有的信息类型,而且必须对允许的内容作更多的限制。
Rules govern how to specialize safely: Each new information type must map to an existing one, and must be more restrictive in the content that it allows.
将多种来源的信息整合在一起将会带来包括访问控制在内的安全性问题。
Pulling together information from a variety of sources also carries with it security concerns, including access control.
全局变量的另一重要方面是,在考虑到信息安全性时,可以对访问进行控制。
Another important aspect of global variables is that where security of the information is an issue, controlling access is possible.
“解锁”信息可以混合并转换为符合环境应用程序的特定需求和要求,而安全和控制则通过企业标准进行管理。
The "unlocked" information can be mixed and transformed to meet specific needs and the demands of situational applications, while security and governance are managed to enterprise standards.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
访问控制模型是信息安全领域研究的重点之一。
The research of access control model is a topic of information security area.
SiteMinder是一种安全性软件解决方案,能实现整个组织的安全性身份管理,控制对企业信息资产的访问。
SiteMinder is a security software solution that securely manages identities across an organization, controlling access to enterprise information assets.
“使命制造(Mission Maker)”网络安全方案包括将网络安全嵌入到指挥控制,增加它作为态势感知要素,提高信息作战能力。
The “Mission Maker” initiatives for cyber security include embedding cyber security into command and control, adding it as an element of situational awareness, and enhancing information operations.
大多数Facebook用户可能不知道,网络实际上提供了一些私有控制和安全功能来帮助你,是你的信息变得更安全。
Unbeknownst to most mainstream Facebook users, the social network actually offers a slew of privacy controls and security features which can help you batten down the hatches, so to speak.
为了应对新挑战,Max和同事一起,以分布式信息流控制(DecentralizedInformationFlow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume。
To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.
LulzSec同时分别发布一条消息为它对索尼的攻击辩护,说这家公司控制敏感信息的方法是“丢脸和不安全的”。
LulzSec also separately posted a message justifying its attack on Sony, saying the company's approach to handling sensitive data was "disgraceful and insecure".
以电力监控系统安全防护要求所建立的生产控制大区与管理信息大区的系统分区,较成体系地构建了核电厂的系统分区框架。
Based on the system partition of the large area of production control and the area of management information, the system partition framework of the nuclear power plant is established.
身份认证与访问控制是信息系统防御主动攻击的主要安全机制。
Identity authentication and access control are the major security mechanisms to defend active attack.
按照等级保护安全技术设计要求,建立工业控制信息安全管理平台。
According to the design requirements of safety technology, the establishment of industrial control information security management platform.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
Consider the effectiveness of the company's internal control system, including information technology security and control.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
通过分析提供的信息,负责人就能选择最安全、最有效的方式来控制被识别出来的危险。
With the information provided by analysis, responsible officials can determine the safest, most efficient means of controlling the hazards identified.
即使操作系统自身也没有被屏蔽储存的完全访问权限,所以入侵者即便控制了操作系统信息也是安全的。
Even if the operating system itself are not shielded stored fully access control, so the invaders even operating system information is safe.
安全控制是保障信息资源共享系统正常运行的重要手段。
Security Control is an important means to ensure Information Resource Sharing System running in gear.
访问控制一直是信息安全的重要保证之一。
The access control is always one of the important guarantees of information security.
提出基于角色权限人员的项目文档权限分配策略,支持了信息交流和安全控制。
Furthermore - the security management policy of project document, based on role - security-personnel, is presented to support information communication and security control.
同时,通过划分用户权限,编制安全控制软件,保证了整个罐区信息系统的安全。
At the same time we can set up different authority for different client and build security control software to guarantee the whole tank area information security.
应用推荐