• 实践结果证明,应用该算法模型实施风险评估对被评估单位的网络安全防护管理工作起到了良好指导作用

    The model is applied in security evaluation work and the practice result proves that the model and algorithm do a good directive function in network security protection and management.

    youdao

  • 现今评估方法多数网络安全事件进行定性评估不能给出网络安全风险定量说明,评估结果缺乏客观性动态性可信性

    Most risk assessment methods only give a qualitative account of the network threat events without the quantitative value, and the evaluation results lack objectivity, dynamics and credibility.

    youdao

  • 提出了一个基于威胁评估模拟攻击安全风险评估模型设计实现了网络安全评估原型系统

    A risk assessment model based on threat assessment and simulation attack is proposed, and a kind of prototype system is designed and realized.

    youdao

  • 当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    youdao

  • 当前常用网络安全评价方法风险评估方法以及利用漏洞扫描工具软件测试评估系统安全程度等。

    At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定