The system plays more and more important role on realizing enterprise's reconstruction, safeguarding the security of business, maintaining the stabilization of society and so on.
它在实现企业复兴,保障交易安全,维护社会稳定等发挥着越重要作用。
Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.
确定几种类型的安全管理策略和防御,并说明如何利用它们,以确保安全,业务应用信息技术。
Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
Other realization decisions for services other than business functionality include: security, management and monitoring of services.
服务的其他实现决策不同于业务功能包括:服务的安全、管理和监视。
Next, measure the level of business risk associated with your assets according to your security policies.
接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
An SSRM helps address the security requirements of SOA, as security is applicable to the entire SSRM—across infrastructure, application, business services, and development services.
SSRM帮助处理SOA的安全需求,因为安全性适用于整个 SSRM——跨越基础设施、应用程序、业务服务和开发服务。
In the ideal case, the SOA application is centered on business logic, delegating the enforcement of security policies, and handling trust relationships for the infrastructure.
在理想的情况下,SOA应用程序的重点在于业务逻辑、委派安全策略的实现,以及处理基础设施的信任关系。
In particular, in business transactions among enterprises, the security requirement of non-repudiation needs to be satisfied.
特别是在企业间的商业交易中,不可抵赖性的安全性要求需要得到满足。
Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.
图8显示了使用业务流程和策略管理组件为企业的业务应用程序提供业务安全服务的业务应用程序服务。
Ultimately, the level of security that is required is a business decision, not a technical one.
归根结底,需要什么安全级别是一个业务决策,而不是技术决策。
SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.
SCA还为单个服务集合的业务解决方案的组装提供了一个模型,并控制解决方案的各个方面,如访问方法和安全。
The organizations have to move from a layer specific security model to a holistic one which includes business processes, users and systems as part of the overall security response model.
组织需要从分层的安全模型转到全局安全模型上来,其中包含了业务流程、用户与系统,他们共同作为整个安全响应模型的组成部分。
To be sure, computer security companies are in the business of not only finding but also marketing security risks.
为确保无误,电脑安全公司不单在做寻找但也再做销售安全风险的生意。
This article also discusses a business case scenario that illustrates a CM system with different levels of security for various CM entities.
本文还讨论了一个业务场景,演示了一个CM系统,其中各个 CM 实体使用不同的安全级别。
Most of the compliance requirements (but not all) involve information security and the associated business risk.
大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。
Lots of business people think they want fine-grained control of each field's security characteristics.
许多业务人员都认为他们需要对每个字段的安全特性进行精细控制。
This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.
这一层可以看作业务安全服务与IT 安全服务之间的链接,它包括策略管理和分发等领域。
By configuring a policy set for the services and references in the sample, you were able to change the security behavior of the services without making any changes to the business logic.
通过为示例中的服务和引用配置策略集,您可以更改服务的安全行为,而无需对业务逻辑进行任何更改。
Security is a multi-faceted problem that requires close analysis of all the vulnerable factors in a business infrastructure.
安全是一个涉及多方面的问题,需要对业务基础设施中所有容易受到危害的因素加以分析。
Ultimately, the level of security required is a business — not a technical — decision.
归根结底,需要什么安全级别是一个业务决策,而不是技术上的问题。
The interface is difficult to spoof because of the way that the security credentials are passed to the business partner.
此接口很难被欺骗,因为安全凭据传递给业务合作伙伴的方式非常安全。
Business application services incorporate some of the business security features to ensure security during business transactions.
业务应用程序服务合并了一些业务安全特性,以确保业务事务执行期间的安全。
Different measures of application software quality are required by different types of business demands such as agility, security, performance, accuracy, and availability.
不同种类的业务需求,如对敏捷性、安全性、运行性、适用性的要求,就需要对应用软件质量的不同评价方法。
The extra cost of paying for private security and backup generators can upend a business model.
为了保障个人安全的措施和后备发电机的准备花费巨大,会颠覆任何一个商业模型。
A.nnotate is definitely geared toward the business crowd, and privacy and security is one of their chief concerns.
nnotate明确地面向商务人群,隐私性和安全性是他们的首要目标之一。
Their fears are justified: a recent survey showed that about a third of those polled would quit doing business with a company they perceived to be guilty of a data security breach.
他们的恐惧变成了现实:最近的一项调查显示,大约 1/3的受调查者在与他们认为存在数据安全隐患的公司进行交易。
Records Management Services manage the retention, access control and security, auditing and reporting, and ultimate disposition of business records.
RecordsManagementServices管理业务记录的保存、访问控制和安全性、审计和报告以及最终处置。
Rule execution Server handles the management, performance, security, and logging capabilities associated with the execution of business rules.
RuleExecutionServer具备处理管理、性能、安全性和与业务规则执行相关的日志功能。
Effective security management protects all it assets to minimize the business impact of security, vulnerabilities and incidents. Some examples of detailed control objectives are.
有效的安全性管理保护所有的IT资产,以减小安全性、弱点及事件的业务影响。
Effective security management protects all it assets to minimize the business impact of security, vulnerabilities and incidents. Some examples of detailed control objectives are.
有效的安全性管理保护所有的IT资产,以减小安全性、弱点及事件的业务影响。
应用推荐