安全策略管理:负责确保整个企业一致地定义和管理安全策略。
Security policy management: Responsible for ensuring that the security policies are consistently defined and managed across the enterprise.
治理和风险管理提供了在更大的SOA环境中实现和强制执行安全策略的机制。
Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment.
创建好安全策略后,安全管理员创建安全标签,安全标签也是安全策略的一部分。
After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.
各个中介模式被适当地放在中介流中以实现预期的交互目标,以及执行管理和安全策略。
Individual mediation patterns are placed appropriately in the mediation flow to achieve the goals of the intended interaction as well as to enforce management and security policies.
创建安全策略之后,安全管理员将创建安全策略中的安全标签。
After creating a security policy, the security administrator creates security labels that are part of that policy.
实施基本的交换机安全策略(包括:端口安全、聚合访问、除VLAN1之外的其他VLAN的管理等等)。
Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)
可能出现下面的情况:一个安全性设置在几年前首次定义队列管理器时是合适的,但现在不再符合您站点的安全策略。
It could be that a security setup that was acceptable several years ago when the queue manager was first defined is no longer consistent with your site security policy.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
可以将安全策略的管理委托给非程序员或不熟悉应用程序实现语言的人。
Administration of security policies can be delegated to a nonprogrammer or to someone not familiar with an application's implementation language.
用户可以在安全策略中创建两种类型的规则,从而防止泄露事件数据和管理数据。
There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
内容和门户管理员必须使用内容属性和元数据(包括用于安全策略的内容属性和元数据)标识所有内容。
All content must be tagged with content attributes and metadata, including those for security policies, by content administrators and portal administrators.
管理员能够定于安全策略,并授权项目经理选择对于他们的项目最好的安全策略。
Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.
精心制定的安全策略应该描述云计算服务的使用者和提供者应该做什么;它可以让提供者减少很多管理时间。
A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
数据库安全管理员通过创建安全策略来配置LBAC系统。
The database security administrator configures the LBAC system by creating security policies.
有时候,系统管理员希望实施不同的安全策略,这时就可能需要修改或替换身份验证方法。
At times, the authentication methodologies may need modification or replacement when system administrators want to enforce different security policies.
下图说明用于管理安全策略的一种操作策略实施架构风格。
An illustration of an operational policy enforcement architectural style for managing security policy is shown in the figure below.
改进的安全性,管理员可以跨越设备强制应用安全策略。
Improved security allowing administrators to enforce security policy across devices.
sugroup提供一种在系统上实现和管理安全策略的方法。
Sugroups provides one method of implementing and managing the security policy on your systems.
在第二幕中,PaaS安全策略的重点是保护数据,此外,还负责管理对应用程序的访问。
In this second act, the PaaS security policy focuses on protecting data in addition to managing access to applications.
管理安全策略的“安全及发现代理”。
可以开发Web服务安全策略应用程序来让系统管理员为具有不同角色和职责的用户自定义设置。
You can develop a Web services security policies application to allow the system administrators custom the settings for users with different roles and responsibilities.
然而,网络系统安全问题不仅仅是技术的问题,而是安全策略、安全技术与安全管理的综合过程,是一项系统工程。
However, network security is not only a technical problem but also a comprehensive systems engineering of security strategy, security technology and security management.
安全设置扩展管理单元扩展组策略管理单元的功能,帮助您为域中的计算机定义安全策略。
The security Settings Extension snap-in extends the Group Policy snap-in and helps you define security policies for computers in your domain.
本文重点以本人所在单位后勤装备信息管理系统的设计过程为实例,详细分析了系统的整体方案设计和安全策略设计。
I mainly take the process of design as example which is the system of logistic equipment information management in my own workplace, analyse the system whole design safety carefully.
本文介绍了所采用的安全策略,重点介绍了全省交通CA认证管理系统组成结构。
The paper introduces the taken safe measures. The introduction centres on composition of traffic CA attestation management system in whole the province.
根据气象网格门户用户管理系统的功能需求,本文首先研究了网格环境的安全需求、GSI安全策略及安全代理技术。
According to the function needs of user management system of CMAG portal, firstly, we studied the security demand of grid environment, GSI security statics and security proxy technology.
安全数据库管理系统的安全策略可以为数据库提供强大的安全功能,现在BLP模型是用得比较普遍的策略模型之一。
The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.
阐述企业办公自动化系统的重要性,使用中的安全隐患,以及应该采取的安全策略:安全防范手段、安全管理和安全认证。
To expound OA system of enterprise is important, safety hidden trouble in use, ought to adopt safety strategy: safety keeping away means, safety manage and safety authentication.
应用推荐