The result of the research is beneficial to the research and design of the information security system.
研究结果对于信息安全系统的研究和设计具有一定参考价值。
Therefore, how to set up an efficient modern information security system becomes a highlighted question increasingly.
因此,如何建立一个高效的现代信息安全体系,日益成为突出的问题。
In recent years, intrusion detection system (IDS), being the important part of the information security system, has gained extensive attentions.
近年来,入侵检测系统IDS作为信息系统安全的重要组成部分,得到了广泛的重视。
Have carried on research to its respect of forming etc, so as to ensure the full play on function of information security system of scientific research.
对其构成等方面进行研究,以确保科研信息保障体系作用的发挥。
In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.
并从管理、技术角度出发,提出了相应的解决方案,以消除医院信息系统的安全隐患。
In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.
在信息安全中,身份认证技术据有极其主要的位置,是信息安全体系的第一个关卡。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
OS was the bridge between hardware and upper layer software of which security is a very important component element of the whole information security system.
操作系统是链接计算机硬件与上层软件及用户的桥梁,其安全性是计算机信息系统安全的重要组成部分。
Last, the simulations of hardware and software show that the information security system based on chaos algorithm have high security level and high performance-value ratio.
最后,通过硬件及软件的仿真结果,表明了本文所设计的基于混沌算法的信息安全系统能够较好的保障信息安全,且系统的性价比较高。
In an information world, they are to coexist for a long time as different component parts of the same information security system, giving play to their own strong points and superiority.
在信息社会中,它们作为同一信息保障体系的不同组成部分,将发挥各自的特点和优势,长期共存下去。
Traditional information security system can only safeguard information transmitting process, but can't control the decoded media data. So it can't prevent the illegal copy of the private.
信息安全技术中采取的密码学技术因仅能控制信息的传布入程,而对于解码后的媒体数据却难以控制,因而无法阻止合法使用者的非法拷贝和传布。
Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.
差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。
The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.
本文从管理、流程、技术、教育、审计等方面出发,通过对多项措施的有机结合,为企业打造一个良好的信息安全体系。
In contrast, a system may require identifying information in order to handle matters such as security or quality of service.
相比而言,为了处理诸如安全或服务质量之类的事情,系统就需要标识信息了。
But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.
但是安全专家警告说攻击者可以利用他们在系统中的立足点偷窃用户和客户的信用卡账号和个人信息。
The server's security system validates the user against its security registry and obtains other security information about the user.
服务器的安全系统将针对安全注册中心对用户进行验证并获得关于用户的安全信息。
You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.
您也可以在得使您相信有人试图威胁系统安全的信息后,执行审计。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
To coordinate the building of state information security protection system;
协调国家信息安全保障体系建设;
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.
操作系统确认bob/bobpsw组合是否有效,把该信息返回给安全插件。
Using WS-Security, the credit card information can instead be sent in encrypted form that can be decrypted only by the banking system that issues the payment confirmation.
使用WS-Security,信用卡信息可以以加密的格式传递,并且仅能由发出付款确认的银行系统解密。
The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.
美国国土安全部需要了解商用电子绩效管理系统的实用性,用于其人力资源管理。
Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.
删除重要信息或破坏数据,提高系统安全行,对密码不符合要求的计算机在多次警告后阻断其连网。
Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.
所以单纯的信息安全意识培训,不足以弥补人在信息系统中的缺陷。
So the establishment of a complete information security training system is the trend of The Times.
那么建立一个完整的信息安全培训体系就是大势所趋了。
Based on our systemic model of information security, we design an electronic seal system.
基于我们提出的信息安全模型,设计了电子印章系统。
Based on our systemic model of information security, we design an electronic seal system.
基于我们提出的信息安全模型,设计了电子印章系统。
应用推荐