Certified Information System Security professional.
信息系统安全专家认证。
The improvement of information system security must start with architecture.
提高信息系统安全必须从体系结构着手。
So, it's such an important problem that how to protect information system security.
因此,如何保障信息系统的安全性,是一个非常重要的问题。
Chapter 3: authenticity of a listed company to disclose information system security.
第三章:上市公司信息披露真实性的制度保障。
Research on the Theories and Key Technologies of Information System Security Evaluation;
信息安全风险评估是考察信息系统安全性的一个重要环节。
At first, this paper analyzes the problems for current information system security strategy.
本文首先分析了当前信息系统安全策略存在的问题。
Twenty-sixth Information System Security Grading Protection filing and evaluation rectification.
第二十六条信息系统安全等级保护定级备案和测评整改。
Used the case methodology to carry on the analysis to the information system security requirements.
采用个案研究法对信息系统安全需求进行分析。
Familiar with the knowledge of the information system security, protection and management practices.
具有很强的安全防护意识,熟悉信息系统安全防护方面的知识和管理方法。
The paper introduces HSS and shows its application in commercial bank information system security management.
论文引入HSS体系并说明其在商业银行信息系统安全管理中的具体运用。
Because database is a set of information, database system security plays a crucial role on the information system security.
而数据库作为信息的载体,它的安全性对整个信息系统的安全起着决定作用。
This paper first introduces nowadays information system security certification and accreditation(C&A)process of American and our country.
该文首先简要介绍了美国的信息系统认证与认可过程和我国现阶段的信息系统测评认证的现状。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
Then, after SSE-CMM is explained, a risk-analysis-centric model of information system security engineering is established using system engineering theory.
在充分研究SSE CMM模型的基础上,采用系统工程的思想,建立了以风险分析为中心的信息系统安全生命期模型。
In the campus network application process, people tend to focus on network environment safety, and ignore the information system security precautions level.
在校园网应用过程中,人们往往侧重于网络环境安全,而忽视了信息系统层面的安全防范。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
The first chapter emphasizes on the importance of information system security. It introduces modern security management theories and the BS7799 security management standard.
第一章重点阐述信息安全管理的重要性,介绍现代安全管理思想,引入国外的BS 7799安全管理标准。
It will greatly assure the national information system security to construct and normalize the national information on the basis of constructing the information system security frame.
从构建信息系统安全架构的高度出发来全面构建和规范我国的信息安全,将有效的保障我国的信息系统安全。
The Information system Security management does not involve only the management system or only the relevant techniques, but includes the relevant strategies, management and techniques.
信息安全管理不单单是管理体制或技术问题,而是策略、管理和技术的有机结合。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
To evaluate the military information system security effectiveness, which involves many factors, is a complex problem, in which the information about specification is incomplete and vague.
军用信息系统效能评估是一个十分复杂的问题,涉及因素多,而且存在部分因素不完全和不确定的问题。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.
通过研究,本文对陕鼓信息系统安全管理有指导作用,对制造型企业信息系统安全管理有借鉴作用。
To evaluate the military information system security effectiveness, which is related to so many factors, is a complex question, in which the information about specification is incomplete and vague.
军用信息系统效能评估是一个十分复杂的问题,涉及因素多,而且存在部分因素不完全和不确定的问题。
To evaluate the military information system security effectiveness, which is related to so many factors, is a complex question, in which the information about specification is incomplete and vague.
军用信息系统效能评估是一个十分复杂的问题,涉及因素多,而且存在部分因素不完全和不确定的问题。
应用推荐