• Certified Information System Security professional.

    信息系统安全专家认证

    youdao

  • The improvement of information system security must start with architecture.

    提高信息系统安全必须从体系结构着手

    youdao

  • So, it's such an important problem that how to protect information system security.

    因此如何保障信息系统的安全性,非常重要问题

    youdao

  • Chapter 3: authenticity of a listed company to disclose information system security.

    第三上市公司信息披露真实性制度保障。

    youdao

  • Research on the Theories and Key Technologies of Information System Security Evaluation;

    信息安全风险评估考察信息系统安全性个重要环节

    youdao

  • At first, this paper analyzes the problems for current information system security strategy.

    本文首先分析了当前信息系统安全策略存在问题。

    youdao

  • Twenty-sixth Information System Security Grading Protection filing and evaluation rectification.

    第二十六条信息系统安全等级保护定级备案测评整改

    youdao

  • Used the case methodology to carry on the analysis to the information system security requirements.

    采用个案研究法信息系统安全需求进行分析

    youdao

  • Familiar with the knowledge of the information system security, protection and management practices.

    具有很强安全防护意识,熟悉信息系统安全防护方面知识管理方法

    youdao

  • The paper introduces HSS and shows its application in commercial bank information system security management.

    论文引入HSS体系说明商业银行信息系统安全管理中的具体运用

    youdao

  • Because database is a set of information, database system security plays a crucial role on the information system security.

    数据库作为信息载体,它的安全性整个信息系统的安全决定作用

    youdao

  • This paper first introduces nowadays information system security certification and accreditation(C&A)process of American and our country.

    该文首先简要介绍美国信息系统认证认可过程我国现阶段的信息系统测评认证的现状。

    youdao

  • The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.

    操作系统安全信息系统安全基石访问控制则是操作系统安全机制重要内容。

    youdao

  • Then, after SSE-CMM is explained, a risk-analysis-centric model of information system security engineering is established using system engineering theory.

    充分研究SSE CMM模型的基础上,采用系统工程思想建立了以风险分析为中心信息系统安全生命期模型。

    youdao

  • In the campus network application process, people tend to focus on network environment safety, and ignore the information system security precautions level.

    校园网应用过程中人们往往侧重网络环境安全忽视信息系统层面安全防范

    youdao

  • Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型的特点进行了讨论

    youdao

  • Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    youdao

  • This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.

    本文提出一种基于信息系统安全性分析来定量计算信息安全风险度量尺度差距分析方法相应评估流程

    youdao

  • Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.

    数据完整性信息系统安全目标之一该文描述了一个时间相关数据库管理系统完整性策略模型

    youdao

  • The first chapter emphasizes on the importance of information system security. It introduces modern security management theories and the BS7799 security management standard.

    第一重点阐述信息安全管理重要性介绍现代安全管理思想引入国外的BS 7799安全管理标准。

    youdao

  • It will greatly assure the national information system security to construct and normalize the national information on the basis of constructing the information system security frame.

    构建信息系统安全架构高度出发来全面构建和规范我国信息安全,有效保障我国的信息系统安全。

    youdao

  • The Information system Security management does not involve only the management system or only the relevant techniques, but includes the relevant strategies, management and techniques.

    信息安全管理单单是管理体制技术问题,而是策略、管理技术有机结合。

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.

    信息安全风险评估信息系统安全工程重要组成部分,也是建立信息安全保障体系的基础

    youdao

  • To evaluate the military information system security effectiveness, which involves many factors, is a complex problem, in which the information about specification is incomplete and vague.

    军用信息系统效能评估一个十分复杂问题涉及因素,而且存在部分因素完全不确定的问题。

    youdao

  • After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.

    信息系统第三测试完成业务单位完成信息系统安全等级保护备案测评整改工作

    youdao

  • Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.

    通过研究本文信息系统安全管理指导作用,对制造企业信息系统安全管理借鉴作用

    youdao

  • To evaluate the military information system security effectiveness, which is related to so many factors, is a complex question, in which the information about specification is incomplete and vague.

    军用信息系统效能评估一个十分复杂问题涉及因素,而且存在部分因素完全不确定的问题。

    youdao

  • To evaluate the military information system security effectiveness, which is related to so many factors, is a complex question, in which the information about specification is incomplete and vague.

    军用信息系统效能评估一个十分复杂问题涉及因素,而且存在部分因素完全不确定的问题。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定