SCAP can be used to quickly find known vulnerabilities and to automate activities such as ongoing security monitoring, vulnerability management and security policy compliance evaluation reporting.
SCAP可以用来快速查找已知的漏洞,以及持续的安全监测、脆弱性管理和安全政策的承诺评价报告等自动操作。
In the face of these accident, setting up one intact security evaluation system to guide equipment management of enterprise become an urgent problem to be solved.
面对这些事故,建立一套完整的安全评估体系用于指导企业的设备管理成为一个迫切需要解决的问题。
Power system state estimation is the core of electric energy management system and the bases of dispatch, control, security evaluation and so on.
电力系统状态估计是电力系统调度、控制、安全评估等方面的基础,也是电能管理系统的核心组成部分。
Through searching the problem of network security evaluation, this paper presents an algorithm to evaluate network security.
对网络系统安全评估问题进行了研究,提出了一种评估网络系统安全的新算法。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
Due to the absence of evaluation theory, most of the security evaluation is informal, random, and low efficient in practice.
由于当前评估理论的匮乏,导致实际中相当多的安全评估不规范,随意,低效率。
Recently, there has been an effort to consolidate these best practices as the Common Criteria for IT Security Evaluation (CC).
最近,业界已经作出了很大的努力,来这些最佳实践合并作为IT安全评估通用标准(Common Criteriafor IT Security Evaluation,CC)。
A novel approach to the security evaluation of information system is presented.
提出了一种新颖的安全评估方法。
Energy security; Evaluation system; The international energy game; Safeguard measures.
能源安全;评价体系;国际能源博弈;保障对策。
Network topology discovery is a technology that research for network structure by collecting network transmission data, which is important in network management and network security evaluation.
网络拓扑发现是通过收集网络传输的信息来研究网络连通结构的一项技术,在网络管理和网络安全评估发面具有重要意义。
Prove what this text design the whole set of way and standard of the enterprise security evaluation of the road conveyance have stronger possibility and maneuverability as a result.
结果证明,本文所设计的整套道路运输企业安全评价办法和标准具有较强的可行性和可操作性。
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
The evolution history of computer security evaluation criteria and the application of security evaluation criteria to the evaluation of security products are analyzed.
分析计算机系统安全标准的演化过程,以及安全评价标准在安全产品评价中的实际应用情况。
Because of explosive materials is a kind of combustible and detonable product, so it is necessary that security evaluation should be conducted systematically and seriously.
民爆器材是一种广泛应用的易燃易爆品,它的安全性评价是系统的、细致的和必要的。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
The index of network security evaluation is used to evaluate network security and indicate the security property of telecom network.
网络安全评估指标是网络安全评估的工具,是反映电信网安全属性的标志。
The paper based on the research of industrial security theory and industrial security evaluation, argues that the existing industrial security evaluation have some limited.
本文通过对产业安全理论和评价的研究,认为现有的产业安全评价模型具有一定的局限性。
This article holds that the oil security evaluation index system is foundation.
本文认为,构建石油安全评价指标体系是评价工作的基础。
At last a security evaluation to this system is given according to the current means to attack the mail system.
最后根据当前常用的电子邮件攻击手段给出该系统的安全评估。
It is crucial to investigate the parameter which effect decisively on the result of security evaluation.
研究评估参数对安全评估结果的影响具有重要意义。
During the process all the security evaluation information is reserved by fuzzy judgment of center of gravity, and gives prominent to key items by assignment of center of gravity.
评价过程中通过采用模糊重心评价方法,保留了所有的系统安全评价信息,且通过重心分配,突出重要的评价项目。
The necessity of evaluation on the environmental security of transgenic rice plants was addressed. The author gives his personal views about the contents for security evaluation.
阐述了转基因水稻抗病植株环境安全性评价的必要性,对环境安全性评价内容提出了个人观点。
According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.
基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。
As water resource is the indispensable material in life and its security is emergent, the development of water security evaluation and assurance system is desiderated so that we can recognize the.
由于水资源是维持生命所必需的物质,其安全保障问题迫在眉睫,因此亟需建立起水安全评价体系及水安全保障体系,通过系统的方法和技术认清水安全形势,探讨保障水安全的措施和方法。
The IAHP can quantify the effect of the evaluation parameters on security evaluation results.
改进的AHP方法可以有效地量化评估参数对评估结果的影响;
The IAHP can quantify the effect of the evaluation parameters on security evaluation results.
改进的AHP方法可以有效地量化评估参数对评估结果的影响;
应用推荐