This paper describes the Security Risk Assessment of information.
本文针对信息安全风险评估进行阐述。
This paper firstly provides the concept of the information security risk assessment.
信息安全风险评估是考察信息系统安全性的一个重要环节。
An security risk assessment model in Intranet is established, because of the network assessment problems.
针对内网安全评估问题构建了内网安全风险评估的系统模型。
Security risk assessment technology must combine theory and practice; operational assessment is the key to the success.
安全风险评估技术既需要有严密的理论、又需要与实践经验相结合,其可操作性成为安全风险评估成功的关键。
Information security risk assessment is an effective way to protect the security of secret-involved information system.
信息安全风险评估是保证信息系统安全保密的重要手段,是涉密信息系统风险管理的重要内容。
At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.
首先从信息安全风险评估的流程入手,着重叙述了信息安全风险评估过程中风险计算的原理和步骤。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
For the conventional security risk assessment, the results by large granularity assessment can't provide security administrators with much effective and applicable information.
传统的风险评估中,大粒度的评估结果不能给安全管理员提供切实有用的信息。
According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.
通过对调研所得数据进行收集、归纳、比较和分析,本文提出了基于ISO 27000的针对复合图书馆信息安全的风险评估实施模型。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.
风险、培训和文化:执行风险评估和容纳计算机及网络基础结构的设施的物理安全性评估。
A Foreign Office spokesman said a security assessment completed with Bermuda police found the men did not pose a significant risk.
一名外事发言人称百慕大警方已对这些囚犯进行了安全评估,结果显示他们不会造成严重危险。
This article briefly covers important aspects of cloud service security issues and then describes the mitigating risks that are part of a risk assessment program.
本文简要讨论云服务安全问题的重要方面,然后描述风险评估和降低风险的步骤。
In the fourth step, you periodically reassess risk assessment program as impacted by new risks, cost-effective security controls, emerging infrastructure technologies, and new legislations.
在第四步中,定期地重新评估风险,因为新的风险、安全控制措施、基础设施技术和法律会影响安全状况。
Because information safety risk assessment is insufficient, lead to security incidents occur repeatedly.
由于信息安全风险评估不足,导致安全事件不断发生。
The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.
正在考虑创建一所新的大学校园,你们的任务是对这所大学的信息技术(IT)安全性的风险评估建立模型。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
Risk assessment as one of the core technologies ensures it system security.
风险评估是信息系统安全保证的关键技术。
As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.
而风险评估作为信息安全管理的一个重要环节,对保障企事业的基础信息系统安全有着非常重要的作用。
Segment information helps improve the predictive ability of information users, and has decision availability in security pricing and risk assessment.
分部信息有助于改善信息使用者的预测能力,并在证券评价、风险评估方面具有决策有用性。
Foreign Office spokesman said a security assessment completed with Bermuda police found the men did not pose a significant risk.
一名外事发言人称百慕大警方已对这些囚犯进行了安全评估,结果显示他们不会造成严重危险。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
The paper makes a research on assessment of risk process based on the SSE-CMM for the electric power communication system security.
本文对基于SSE-CMM的电力通信系统安全评估-风险过程进行了研究。
In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.
第三部分,论文着重研究了一种基于资产、威胁和弱点的信息安全风险评估量化模型。
Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.
风险评估必须用到评估工具来完成对信息保护的工作,从而建立信息安全的管理体系。
Security assessment is an important process to carry out information system risk management.
安全评估是对信息系统进行风险管理的一个重要步骤。
Mainly it includes the HNYD business environment and internal control, risk prevention and assessment, and income security to propose specific improvement measures.
主要从HNYD的经营环境和内部控制意识、风险预防和评估、收入保障和费用监控四个方面提出了具体的改善措施。
Traditional risk assessment is often once and for all, commonly performed at the beginning of a project to direct the configuration of security equipments.
传统的信息安全风险评估往往是一次性的,一般在项目实施之初进行安全风险的评估,用来指导安全设备的配备。
Traditional risk assessment is often once and for all, commonly performed at the beginning of a project to direct the configuration of security equipments.
传统的信息安全风险评估往往是一次性的,一般在项目实施之初进行安全风险的评估,用来指导安全设备的配备。
应用推荐