• This paper describes the Security Risk Assessment of information.

    本文针对信息安全风险评估进行阐述

    youdao

  • This paper firstly provides the concept of the information security risk assessment.

    信息安全风险评估考察信息系统安全性一个重要环节。

    youdao

  • An security risk assessment model in Intranet is established, because of the network assessment problems.

    针对内网安全评估问题构建了内网安全风险评估系统模型

    youdao

  • Security risk assessment technology must combine theory and practice; operational assessment is the key to the success.

    安全风险评估技术需要严密理论、又需要实践经验相结合,其可操作性成为安全风险评估成功关键

    youdao

  • Information security risk assessment is an effective way to protect the security of secret-involved information system.

    信息安全风险评估是保证信息系统安全保密重要手段涉密信息系统风险管理的重要内容。

    youdao

  • At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.

    首先信息安全风险评估流程入手着重叙述信息安全风险评估过程风险计算原理步骤

    youdao

  • Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.

    负责公司的信息系统安全评估控制风险制定安全政策、制定灾难恢复计划确保政策与计划执行。

    youdao

  • For the conventional security risk assessment, the results by large granularity assessment can't provide security administrators with much effective and applicable information.

    传统风险评估中,粒度评估结果不能安全管理员提供切实有用的信息。

    youdao

  • According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.

    通过调研所得数据进行收集归纳比较分析,本文提出了基于ISO 27000针对复合图书馆信息安全风险评估实施模型

    youdao

  • Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.

    信息安全风险评估信息系统安全工程重要组成部分,也是建立信息安全保障体系的基础

    youdao

  • Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.

    风险培训文化执行风险评估容纳计算机网络基础结构设施物理安全性评估。

    youdao

  • A Foreign Office spokesman said a security assessment completed with Bermuda police found the men did not pose a significant risk.

    名外事发言人称百慕大警方已对这些囚犯进行安全评估结果显示他们不会造成严重危险。

    youdao

  • This article briefly covers important aspects of cloud service security issues and then describes the mitigating risks that are part of a risk assessment program.

    本文简要讨论服务安全问题重要方面然后描述风险评估降低风险步骤

    youdao

  • In the fourth step, you periodically reassess risk assessment program as impacted by new risks, cost-effective security controls, emerging infrastructure technologies, and new legislations.

    第四步中定期地重新评估风险因为新的风险安全控制措施基础设施技术法律会影响安全状况。

    youdao

  • Because information safety risk assessment is insufficient, lead to security incidents occur repeatedly.

    由于信息安全风险评估不足导致安全事件不断发生

    youdao

  • The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.

    正在考虑创建一所新的大学校园你们任务大学信息技术(IT)安全性风险评估建立模型

    youdao

  • Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    youdao

  • Risk assessment as one of the core technologies ensures it system security.

    风险评估信息系统安全保证关键技术

    youdao

  • As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.

    风险评估作为信息安全管理重要环节,对保障企事业的基础信息系统安全有着非常重要作用

    youdao

  • Segment information helps improve the predictive ability of information users, and has decision availability in security pricing and risk assessment.

    分部信息有助于改善信息使用者预测能力证券评价风险评估方面具有决策有用性

    youdao

  • Foreign Office spokesman said a security assessment completed with Bermuda police found the men did not pose a significant risk.

    一名外事发言人称百慕大警方已对这些囚犯进行安全评估结果显示他们不会造成严重危险。

    youdao

  • This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.

    本文提出一种基于信息系统安全性分析来定量计算信息安全风险度量尺度差距分析方法相应评估流程

    youdao

  • The paper makes a research on assessment of risk process based on the SSE-CMM for the electric power communication system security.

    本文基于SSE-CMM电力通信系统安全评估-风险过程进行研究

    youdao

  • In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.

    第三部分论文着重研究了一种基于资产威胁弱点信息安全风险评估量化模型

    youdao

  • Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.

    风险评估必须用到评估工具完成对信息保护的工作,从而建立信息安全管理体系。

    youdao

  • Security assessment is an important process to carry out information system risk management.

    安全评估信息系统进行风险管理一个重要步骤

    youdao

  • Mainly it includes the HNYD business environment and internal control, risk prevention and assessment, and income security to propose specific improvement measures.

    主要HNYD经营环境内部控制意识、风险预防评估收入保障和费用监控四个方面提出了具体改善措施

    youdao

  • Traditional risk assessment is often once and for all, commonly performed at the beginning of a project to direct the configuration of security equipments.

    传统信息安全风险评估往往一次性的,一般项目实施初进行安全风险的评估,用来指导安全设备的配备。

    youdao

  • Traditional risk assessment is often once and for all, commonly performed at the beginning of a project to direct the configuration of security equipments.

    传统信息安全风险评估往往一次性的,一般项目实施初进行安全风险的评估,用来指导安全设备的配备。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定