Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.
首先,介绍RFID系统的组成、工作原理并阐述了在RFID系统中针对电子标签信息安全性和隐私性的威胁。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
The conformation, control method and the information treatment ability of a control system are crucial factors to the reliability, security and stability of the system.
系统的构成和控制方式以及信息处理能力,对于控制系统的可靠性、安全性、稳定性而言,是决定性的因素。
The security of ERP information management system was considered firstly when the small and medium enterprises implemented ERP system.
ERP信息管理系统软件的安全性是中小型企业在实施ERP系统时必须考虑的问题。
With the expansion of the usable range of accounting information system and deepening of using degree, security of accounting information system has become a critical and urgent issue for enterprises.
随着企业会计信息系统使用范围的扩大和使用程度的加深,会计信息系统的安全性成为企业面临的一个关键而紧迫的问题。
This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.
本文论述了信息系统的表现形态和系统结构,并分析了信息系统面临的安全风险。
The method can solve the question of the secret key security in larger system and provide a valuable guarantee system of information security.
该方法能够解决较大系统中密钥安全性的问题,提供了一个安全可行的信息安全保障体系。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
A lot of work has been done towards the higher security of information system, and many mature information system prototypes have been developed.
长期以来,人们针对信息系统的安全问题作了大量研究,已经有许多成熟的信息系统安全模型。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
This introduces the designed of the residence district intelligentized system from three aspects: security defence system, material management system and information network system.
从安全防范子系统、物业管理子系统和信息网络子系统三个方面介绍了对住宅小区智能化系统的设计。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
Data audit is one of the most important parts in information system audit, it has important significance to maintain the security and stability of information system.
数据审计作为信息系统审计的重要组成部分,对信息系统的安全与稳定具有十分重要的意义。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
Security measures of the enterprise information system data were discussed in this article on protecting data and system.
从保护数据和主机系统的角度,阐述了企业信息系统数据的安全保护措施。
The purpose of the project is analyzing the current status of the information system, finding the limitation, and constructing the security architecture for the information system.
项目的目标是对目前铁路信息系统现状进行分析,找出安全方面的缺陷和漏洞,并在此基础上构造铁路信息系统安全构架。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.
为了保障移动通信信息系统的安全,制定有效的、操作性的、学的安全风险评估体系是当务之急。
Platform system SecurityPlatform system security is the base of the platform security, and gives strongly support to platform information security.
平台系统安全是整个平台安全的基础,为平台信息安全提供了有力的支持。
It will greatly assure the national information system security to construct and normalize the national information on the basis of constructing the information system security frame.
从构建信息系统安全架构的高度出发来全面构建和规范我国的信息安全,将有效的保障我国的信息系统安全。
This method can be used in other continuous chaotic system and the application of chaotic system in information security and secure communication field will be accelerated.
该法可应用于其他连续混沌系统中,有助于加快混沌系统在信息安全及保密通信网络领域中的应用。
The standardization of Unified ETC System will be involved with wireless communication, CPU IC, information security, system integration, testing etc.
联网电子收费系统涉及无线通讯、智能卡技术、信息安全、系统集成、测试技术等多个领域。
In recent years, intrusion detection system (IDS), being the important part of the information security system, has gained extensive attentions.
近年来,入侵检测系统IDS作为信息系统安全的重要组成部分,得到了广泛的重视。
From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.
本文从点(会计数据)到面(会计信息系统)构建了电子商务环境下企业会计的安全控制体系。
The paper also presents the layout of security safeguard system of information system and discusses implement policy of security safeguard system of information system.
本文还给出了信息系统安全保障体系的规划方式,构建信息系统安全保障体系实施策略。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
This paper explicates that applying DEBUG program can effect hard dish backup and recover of information system; applying the recover method can improve security of micro computer system.
阐述了应用DEBUG系统程序对硬盘系统区信息备份与恢复的方法,应用该方法可提高微机系统安全。
应用推荐