Security policies are the key to the security of information systems.
安全策略是信息系统安全的关键。
Process audit software on information system applications is effective means in ensuring security of information systems.
信息系统应用过程审计是一种有效的信息系统安全保障手段。
Access control, as one of 5 standard security services defined by ISO, is an important mechanism for security of information systems.
访问控制作为国际化标准组织定义的五项标准安全服务之一,是实现信息系统安全的一项重要机制。
It is the precondition for the security of information systems to assure the completeness, correctness and consistency of security policies.
信息系统安全的前提是确保安全策略的完备、正确和一致。
If we ignore protecting the security of information systems, the system could be damaged, thereby the organizations could or loss properties and reputations.
如果不对信息系统进行安全保护,就可能使系统遭到破坏,进而使组织遭受财产或名誉损失。
Based on modern cryptography, the security of information systems fundamentally depends upon the randomness of random Numbers which are used to produce important secret data.
建立在现代密码学基础上的信息安全系统,其安全性从根本上依赖于产生重要秘密数据所用随机数的随机性。
Security of information security products – information security special product technology is a security product specifically developed to enhance the security of information systems.
信息安全专用产品安全——信息安全专用产品技术是专门为增强信息系统的安全性开发的安全产品。
Security breaches on systems that run intermediaries can result in serious security problems, like loss of secure information and message integrity, which will raise questions of trust.
运行中介体的系统上出现的安全性违规会导致严重的安全性问题,如丢失安全信息和消息完整性,这将引起信任问题。
The CIA triad is a widely used information assurance (ia) model that identifies confidentiality, integrity, and availability as the fundamental security characteristics of all information systems.
CIA三部曲是广泛使用的信息保证(Information Assurance,IA)模型,此模型将保密性、完整性和可用性定义为所有信息系统的基础安全特征。
Because there are many degrees of freedom and many different sources of this information, some users tend to overlook security issues and deploy systems that are not particularly secure.
这些信息有许多自由度和许多不同的来源,所以一些用户往往会忽视安全性问题,部署的系统不够安全。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
世界卫生组织采用一系列技术和安全措施以防范我们系统上所保存信息的丢失、滥用、未经授权的存取或公布、修改或损毁。
The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.
信息安全的利益在于——保护计算机系统和网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作。
The information security in electric power systems becomes the important composing part of the producing, dealing and managing of electric power corporations.
电力系统信息安全已经成为电力企业生产、经营和管理的重要组成部分。
The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.
数据库是所有信息系统的核心,数据库的安全通常是指其中所存数据的安全,是网络安全、信息安全的重要组成部分。
The security problem of XML data existed in logistic information systems. The application of the XML encryption, XML data signature and XKMS insure the security of logistic information.
当前物流信息系统中存在着XML数据安全的问题,根据XML加密、XML数字签名和XML密钥管理规范服务(XKMS)三种核心标准,在数据交换中确保XML数据的安全。
This paper delves into the depths of current hospital information systems and reveals disturbing but significant security problems in these systems.
本文深入到当前的医院信息系统内部,揭示出这些系统中令人不安的却又极其重要的安全问题。
For special information security systems, the paper states a class of interesting problems neglected before.
对于特殊信息安全系统而言,陈述了一类以前所忽略的有趣问题。
Users in different environments have different requirements for information security, so it's required that users can customize the levels of information security in their systems.
不同环境下的用户对于信息安全有着不同的需求,因此需要使系统中信息的安全性可以让用户定制。
Many authorization models have been proposed to ensure information security of computer systems.
人们已经提出了一些授权模型,以保证计算机系统的信息安全。
To ensure systems security must think over network, operating system, application and operation demand etc in the synthetical information management systems of electric power corporations.
在电力企业的综合信息管理系统中,必须从网络、操作系统、应用程序和业务需求等各方面来保证系统的安全。
The paper analyzes the security problem of XML data in logistic information systems, and develops a scheme for XML data secure transmission.
本文针对XML数据的安全性问题,为此设计了物流信息系统中xml数据的安全传输方案。
The key of security on commercial information systems is to preserve the data integrity within them.
商务信息系统安全的核心目标是维持系统数据的完整性。
As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.
而风险评估作为信息安全管理的一个重要环节,对保障企事业的基础信息系统安全有着非常重要的作用。
The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.
企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制和管理控制。
And with the rapid increasing of data information, modern network storage systems are now bidding for more and more demands on data backup in scalability, efficiency, security and availability.
同时数据信息的急剧膨胀,对数据备份系统的规模、效率、安全性和可靠性都提出了更高的要求。
Database systems play a key role in the storage and processing of information and are vital parts of the overall information security architecture.
而作为信息存储和处理的核心环节,数据库系统在整个信息安全体系中占据着关键位置。
The interface of ca and DSMS integrating with various hospital information systems (such as RIS, HIS and PACS) was realized and the security verification of system information was completed.
同时实现了与现有各种医院信息系统(如ris,HIS和PACS)的接口与集成,并完成了对其系统信息的安全验证。
The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.
信息系统中的安全性问题主要包含身份认证服务、访问控制服务、数据保密服务、数据完整牲服务和不可否认服务等几个方面。
That information, in turn, can be used for a variety of purposes, such as detecting unusual activity, improving security and recognizing advantageous scenarios in CRM and supply-chain systems.
该信息反过来又能用于各种不同的目的,如检测不寻常的活动、改进安全、以及重组CRM(客户关系管理)和供应链系统中优势的情景。
应用推荐