具有必备的服务设备和完善的数据安全保护措施;
They have the necessary service facilities and shall take effective measures to ensure the security of their data.
涉及保护数据和人员的网络安全正面临多重威胁,尤其是网络犯罪和网络行业间谍,这两种威胁都在迅速增长。
Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
数据保护,包括添加安全策略,可以在创建表时进行,也可以在创建表之后通过修改表来实现。
Data protection, including adding a security policy, can be done when creating the table or later by altering the table.
这些策略由安全服务器集中管理,并且发送到根据需要保护数据的代理。
The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.
是否有敏感数据,具有额外安全特性的文件系统可能能够进一步保护它们?
Do you have sensitive data that might benefit from file systems with extra security features?
可以将安全标签授给用户,允许他们访问受保护的数据。
They are granted to users to allow them access to protected data.
另外,所有XML数据都受到用于保护传统关系数据的安全和数据完整性控件的保护。
In addition, all XML data is protected by the same security and data integrity controls that protect the traditional relational data.
——新的安全措施将用来保护每个用户的数据。
这种在文件中储存数据的方法是一种比较安全的保护隐私性的方法(记住,如果S3密匙被盗,您将为他人购买带宽)。
This method of storing the data in a file is a fairly safe way of protecting secret values (remember, if your S3 keys get stolen, you'll be paying for someone else's bandwidth).
在这种情况下,保护公司数据的安全对任何公司的IT部门来说都是一个极大的挑战。
Keeping company data secure has become a significant challenge for any corporate IT department.
在第二幕中,PaaS安全策略的重点是保护数据,此外,还负责管理对应用程序的访问。
In this second act, the PaaS security policy focuses on protecting data in addition to managing access to applications.
Kerberos是用于网络身份验证和保护数据传输的最流行的安全机制。
Kerberos is a popular security mechanism used by systems for network authentication and secure transmission of data.
如果用户拥有安全策略使用的每个规则的豁免权,那么该用户将拥有受那个安全策略保护的所有数据的完全访问权。
If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
确保机密信息的安全和保护客户的个人数据是每个企业的重要目标。
Securing confidential information and protecting the personal data of customers are important objectives for every enterprise.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
The database security administrator allows users access to protected data by granting them security labels.
当一个用户试图访问受保护的数据时,必须将他的安全标签与保护数据的安全标签进行比较。
When a user tries to access protected data, his security label is compared to the security label that is protecting the data.
安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
The security administrator allows users access to protected data by granting them security labels.
然而,由负责保护数据安全的组织管理的内部审核以及变更流程,可帮助防止安全缺失。
However, internal reviews and change processes, managed by the organization responsible for safeguarding the data, help prevent security misses.
在服务和属性级别上启用身份验证的业务服务,支持主数据的私密性和安全性,因为它需要保护和治理。
Business services that are enabled to implement authorization on service and attribute level, supporting privacy and security aspects of the master data since it needs to secured and governed.
豁免权使用户可以访问其安全标签不允许其访问的受保护数据。
An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing.
数据保护是一系列计算出的风险,像快照、连续数据保护(CDP)、复制和RAID技术都无法提供绝对的安全保障。
Data protection is always a series of calculated risks, and even such technologies as snapshots, continuous data protection (CDP), replication, and RAID are not absolute guarantees of security.
磁带提供与磁盘系统不同的技术区别,离线备份能够解决安全和数据保护问题。
Tape provides another technical differentiator from disk systems that addresses both security and data protection concerns: a completely offline copy of data.
磁带提供与磁盘系统不同的技术区别,离线备份能够解决安全和数据保护问题。
Tape provides another technical differentiator from disk systems that addresses both security and data protection concerns: a completely offline copy of data.
应用推荐