Research on the Theories and Key Technologies of Information System Security Evaluation;
信息安全风险评估是考察信息系统安全性的一个重要环节。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.
为了保障移动通信信息系统的安全,制定有效的、操作性的、学的安全风险评估体系是当务之急。
To the question, the paper presents a system evaluation method and software based on the evaluation Criteria for Information Technology Security (Common Criteria).
针对这个问题,设计实现了基于信息技术安全性评估准则(通用标准)的系统评估方法和软件。
A novel approach to the security evaluation of information system is presented.
提出了一种新颖的安全评估方法。
Twenty-sixth Information System Security Grading Protection filing and evaluation rectification.
第二十六条信息系统安全等级保护定级备案和测评整改。
The algorithm handles uncertain information with Bayesian inference, giving a quantitative evaluation of the security state of a system and eliminating false alarms effectively.
算法用贝耶斯推理处理不确定信息,量化地评估系统安全状态,并且有效地消除误报。
The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded.
对信息安全风险评估和系统风险的整体评价进行了理论归纳。
According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.
基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。
According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.
基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。
应用推荐