• Security policies are the key to the security of information systems.

    安全策略信息系统安全关键

    youdao

  • Process audit software on information system applications is effective means in ensuring security of information systems.

    信息系统应用过程审计种有效信息系统安全保障手段

    youdao

  • Access control, as one of 5 standard security services defined by ISO, is an important mechanism for security of information systems.

    访问控制作为国际化标准组织定义标准安全服务之一实现信息系统安全的一项重要机制

    youdao

  • It is the precondition for the security of information systems to assure the completeness, correctness and consistency of security policies.

    信息系统安全前提确保安全策略完备正确一致

    youdao

  • If we ignore protecting the security of information systems, the system could be damaged, thereby the organizations could or loss properties and reputations.

    如果不对信息系统进行安全保护就可能使系统遭到破坏,进而使组织遭受财产名誉损失

    youdao

  • Based on modern cryptography, the security of information systems fundamentally depends upon the randomness of random Numbers which are used to produce important secret data.

    建立现代密码学基础上信息安全系统安全性从根本上依赖产生重要秘密数据所用随机数随机性

    youdao

  • Security of information security productsinformation security special product technology is a security product specifically developed to enhance the security of information systems.

    信息安全专用产品安全——信息安全专用产品技术专门增强信息系统安全性开发安全产品。

    youdao

  • Security breaches on systems that run intermediaries can result in serious security problems, like loss of secure information and message integrity, which will raise questions of trust.

    运行中介体系统出现的安全性违规导致严重的安全性问题丢失安全信息消息完整性引起信任问题

    youdao

  • The CIA triad is a widely used information assurance (ia) model that identifies confidentiality, integrity, and availability as the fundamental security characteristics of all information systems.

    CIA三部曲广泛使用信息保证(Information Assurance,IA)模型,此模型将保密性完整性可用性定义所有信息系统基础安全特征

    youdao

  • Because there are many degrees of freedom and many different sources of this information, some users tend to overlook security issues and deploy systems that are not particularly secure.

    这些信息许多自由度许多不同来源,所以一些用户往往忽视安全性问题部署系统不够安全

    youdao

  • The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.

    系统管理员可以通过审计系统记录安全性相关信息以后可以分析这些信息,寻找违反可能违反系统安全策略的地方。

    youdao

  • WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.

    世界卫生组织采用一系列技术安全措施防范我们系统所保存信息丢失滥用未经授权存取公布修改损毁

    youdao

  • The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.

    信息安全利益在于——保护计算机系统网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作

    youdao

  • The information security in electric power systems becomes the important composing part of the producing, dealing and managing of electric power corporations.

    电力系统信息安全已经成为电力企业生产经营管理重要组成部分

    youdao

  • The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.

    数据库所有信息系统核心,数据库的安全通常其中所存数据的安全,是网络安全、信息安全的重要组成部分

    youdao

  • The security problem of XML data existed in logistic information systems. The application of the XML encryption, XML data signature and XKMS insure the security of logistic information.

    当前物流信息系统存在XML数据安全问题,根据XML加密、XML数字签名XML密钥管理规范服务(XKMS)三种核心标准,数据交换中确保XML数据的安全。

    youdao

  • This paper delves into the depths of current hospital information systems and reveals disturbing but significant security problems in these systems.

    本文深入当前医院信息系统内部,揭示出这些系统令人不安的极其重要安全问题

    youdao

  • For special information security systems, the paper states a class of interesting problems neglected before.

    对于特殊信息安全系统而言陈述了一类以前所忽略有趣问题

    youdao

  • Users in different environments have different requirements for information security, so it's required that users can customize the levels of information security in their systems.

    不同环境下用户对于信息安全有着不同的需求因此需要使系统信息的安全性可以让用户定制

    youdao

  • Many authorization models have been proposed to ensure information security of computer systems.

    人们已经提出了一些授权模型保证计算机系统信息安全

    youdao

  • To ensure systems security must think over network, operating system, application and operation demand etc in the synthetical information management systems of electric power corporations.

    电力企业综合信息管理系统中,必须网络操作系统应用程序业务需求各方面保证系统的安全

    youdao

  • The paper analyzes the security problem of XML data in logistic information systems, and develops a scheme for XML data secure transmission.

    本文针对XML数据安全性问题为此设计物流信息系统xml数据的安全传输方案

    youdao

  • The key of security on commercial information systems is to preserve the data integrity within them.

    商务信息系统安全核心目标维持系统数据完整性

    youdao

  • As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.

    风险评估作为信息安全管理重要环节,对保障企事业的基础信息系统安全有着非常重要作用

    youdao

  • The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.

    企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制管理控制。

    youdao

  • And with the rapid increasing of data information, modern network storage systems are now bidding for more and more demands on data backup in scalability, efficiency, security and availability.

    同时数据信息急剧膨胀,数据备份系统规模效率安全性可靠性提出了更高的要求

    youdao

  • Database systems play a key role in the storage and processing of information and are vital parts of the overall information security architecture.

    而作为信息存储处理核心环节数据库系统整个信息安全体系占据着关键位置。

    youdao

  • The interface of ca and DSMS integrating with various hospital information systems (such as RIS, HIS and PACS) was realized and the security verification of system information was completed.

    同时实现了现有各种医院信息系统(ris,HISPACS)接口集成完成了对其系统信息安全验证

    youdao

  • The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.

    信息系统中的安全性问题主要包含身份认证服务访问控制服务、数据保密服务、数据完整牲服务和不可否认服务几个方面。

    youdao

  • That information, in turn, can be used for a variety of purposes, such as detecting unusual activity, improving security and recognizing advantageous scenarios in CRM and supply-chain systems.

    信息反过来用于各种不同目的检测不寻常活动改进安全以及重组CRM(客户关系管理)供应链系统优势情景

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定