In this paper, the evaluation of security about the "project process" of Power Communication Network based on SSE-CMM is discussed.
本文对基于SSE - CMM的电力通信专网“工程过程”的安全评估进行了研究。
First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.
首先介绍了此方法的基本原理,然后介绍了该方法在安全漏洞评估中的具体实现。
The evolution history of computer security evaluation criteria and the application of security evaluation criteria to the evaluation of security products are analyzed.
分析计算机系统安全标准的演化过程,以及安全评价标准在安全产品评价中的实际应用情况。
Standardized statistical analysis is not only the foundation for evaluation of security and validity of drug, but also the important sign of standardized high-quality clinical trial.
标准化的统计分析不仅是正确评价药物安全性和有效性的基础和依据,更是规范化高质量临床试验的重要标志。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
In the face of these accident, setting up one intact security evaluation system to guide equipment management of enterprise become an urgent problem to be solved.
面对这些事故,建立一套完整的安全评估体系用于指导企业的设备管理成为一个迫切需要解决的问题。
The working condition of mechanical components can be indicated by their stress states, whose measurement and evaluation can also improve the security, reliability and stability of the products.
零件的应力状况能够反映机械构件的工作状态,对它的有效检测和评估为提高产品的安全性、可靠性和稳定性提供了保障。
Through searching the problem of network security evaluation, this paper presents an algorithm to evaluate network security.
对网络系统安全评估问题进行了研究,提出了一种评估网络系统安全的新算法。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
Due to the absence of evaluation theory, most of the security evaluation is informal, random, and low efficient in practice.
由于当前评估理论的匮乏,导致实际中相当多的安全评估不规范,随意,低效率。
A novel approach to the security evaluation of information system is presented.
提出了一种新颖的安全评估方法。
Power system state estimation is the core of electric energy management system and the bases of dispatch, control, security evaluation and so on.
电力系统状态估计是电力系统调度、控制、安全评估等方面的基础,也是电能管理系统的核心组成部分。
The evaluation of the performance of bridge is vital important to the public traffic security.
桥梁安全性能评估对保证公共交通安全意义重大。
An evaluation of an organization, system, process or product. Outsourcing audits take three forms: security, billing and performance.
对组织、系统、流程或者产品进行评估的行为。外包审计有三种形式:安全、票据与绩效。
Evaluation should include evaluation of potential risks of the facility's chain lock security, the facility's cabinets and other key of the equipment, etc.
评估应包括对设施链锁安全的潜在风险,机柜和设备的其他关键的评估。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
The research on the fault level of tie line is of significance for the security and stability evaluation of power system as well as the preventive control of transient stability.
研究联络线故障水平对电力系统暂态稳定性的影响,对于电力系统的安全稳定评估与校核,以及暂态稳定预防控制都有着重要意义。
Prove what this text design the whole set of way and standard of the enterprise security evaluation of the road conveyance have stronger possibility and maneuverability as a result.
结果证明,本文所设计的整套道路运输企业安全评价办法和标准具有较强的可行性和可操作性。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Dynamic security management requires real-time evaluation online of the network system in the running state.
动态安全管理要求根据系统运行状况实时在线评估网络的安全状态。
To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.
为了保障移动通信信息系统的安全,制定有效的、操作性的、学的安全风险评估体系是当务之急。
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
The index of network security evaluation is used to evaluate network security and indicate the security property of telecom network.
网络安全评估指标是网络安全评估的工具,是反映电信网安全属性的标志。
The paper based on the research of industrial security theory and industrial security evaluation, argues that the existing industrial security evaluation have some limited.
本文通过对产业安全理论和评价的研究,认为现有的产业安全评价模型具有一定的局限性。
The central work of the evaluation lies in the evaluation of the security and stability of the ventilation system of mine.
矿井通风系统安全评价的中心工作就在于对矿井通风系统的安全性和稳定性进行评价。
It is crucial to investigate the parameter which effect decisively on the result of security evaluation.
研究评估参数对安全评估结果的影响具有重要意义。
The five dimensions based on the research consist of reception service, cleanness and virescence, security, repairing service, and total evaluation.
物业管理业主满意度调查的五个维度是:服务接待、保洁绿化、保安消防、维修服务和综合评价。
Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.
已提出的信息系统安全评估的准则和标准在理论结构上还不成熟,而且可操作性不强。
Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.
已提出的信息系统安全评估的准则和标准在理论结构上还不成熟,而且可操作性不强。
应用推荐