有效的防控体系对于确保产品安全而言是必不可少的,而且在如何使风险最小化方面存在着大量信息。
Effective control systems are critical in ensuring product safety, and considerable information is available on how to minimize the risks.
全球药品安全依靠强有力的国家体系,这种体系监测药物的开发和质量,对危害作用做出报告,并对药物的安全使用提供准确信息。
Global drug safety depends on strong national systems that monitor the development and quality of medicines, report their harmful effects, and provide accurate information for their safe use.
该项目还包括一个信息技术安全体系结构和概念。
The project also includes an IT-Security Architecture and Concept.
那么建立一个完整的信息安全培训体系就是大势所趋了。
So the establishment of a complete information security training system is the trend of The Times.
上面的种种,都是唯品会在信息安全培训中遇到过的问题。简单总结起来就是“用户体验差,未形成体系”。
All of the above, are the problems encountered in vip. com information security training. Simple summary is the user experience is poor, did not form a system.
同时,对该方案的硬件选型、软件功能模块、支付方案、客户信息统计与分析和安全体系进行了全面细致的分析。
Meanwhile, the thesis explained about how to choose hardware, software and payment way, how to count the customers' information and analyzed the safety system.
SecurityAssertionMarkupLanguage规范(SAML)是一个基于XML的框架,旨在解决SOA体系结构中与交换安全信息相关的问题。
The security Assertion Markup Language specification (SAML) is an XML based framework that aims to solve problems associated with exchanging security information in an SOA architecture.
本标准用于为建立、实施、保持和持续改进信息安全管理体系提供要求。
This International Standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system.
分析表明,新模型中定义的规则是合理的、安全的,这对信息安全体系结构模型的构建将起到积极作用。
The rules in the new model are reasonable and secure by analysis, and will rise the positive effect to design information security architecture model.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
记录的信息安全体系结构及其组成部分的认识是至关重要的整体保护战略,并确定了单点故障。
Documenting the information security architecture and its components is critical to understanding the overall protection strategy, and identifying single points of failure.
以电力监控系统安全防护要求所建立的生产控制大区与管理信息大区的系统分区,较成体系地构建了核电厂的系统分区框架。
Based on the system partition of the large area of production control and the area of management information, the system partition framework of the nuclear power plant is established.
如何保证数据为企业信息体系提供安全、稳固的服务己成为企业用户的关注点。
How does data provide safe and steady services for the information system, which becomes the concern of enterprise customers.
如何让读者既能充分利用数字化图书馆的信息资源,又保证数字化图书馆的信息与网络安全,就需要建立数字化图书馆信息安全保障体系。
How to let readers to sufficiently use the information resource of digital library as well as ensure the security of information and network of digital library.
本文从管理、流程、技术、教育、审计等方面出发,通过对多项措施的有机结合,为企业打造一个良好的信息安全体系。
The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.
信息安全工具包用于开发信息安全应用产品。基于传统工具包的缺陷,需要构建一种新的基于模块的信息安全工具包的体系架构。
Information security toolkit is used to develop information security products. Because of the defects of traditional toolkit, a new architecture based on module is presented in the paper.
PKI是目前国际上研究最热的信息安全技术。信任模型在PKI体系中占有重要地位。
PKI is the latest information security technology in the world, and trust model is very important in PKI system.
按照组织的需要实施信息安全管理体系,是本标准所期望的。
It is expected that an information security management system implementation will be scaled in accordance with the needs of the organization.
基于传统工具包的缺陷,需要构建一种新的基于模块的信息安全工具包的体系架构。
Because of the defects of traditional toolkit, a new architecture based on module is presented in the paper.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
经过不断地探索实践和总结,唯品会已经形成相对成熟的信息安全培训体系(下面简称体系),如上图所示。
After continuous exploration and practice, vip. com has formed a relatively mature information security training system (hereinafter referred to as the system), as shown above.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
比较详细地介绍信息安全管理体系的内容和构建信息安全管理的方法和途径。
The article depicts in detail about the content of the information security management system and its establishing methods approaches.
密码算法的安全、准确和快速的实现决定了信息安全体系的安全性和实用性。
Speed, precision and security of the related algorithms altogether determine the efficiency and safety of the information system.
该方法能够解决较大系统中密钥安全性的问题,提供了一个安全可行的信息安全保障体系。
The method can solve the question of the secret key security in larger system and provide a valuable guarantee system of information security.
入侵检测是信息安全保护体系中的一个重要组成部分,确保计算机网络资源的安全性。
Intrusion detection is an essential component of information security protection system, which guarantees the security of the network resource.
着重介绍网络环境下医院信息管理系统的安全保障体系,从三个层面来构筑数据保护的屏障。
This article outlines the methods of building a safe environment for the hospital information system, and protecting data in three levels.
风险评估必须用到评估工具来完成对信息保护的工作,从而建立信息安全的管理体系。
Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.
在信息安全中,身份认证技术据有极其主要的位置,是信息安全体系的第一个关卡。
In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.
重要的是建立和完善财务管理信息系统;并通过健全财务信息安全防范体系使信息时代财务管理更安全可靠地运行。
It is the most important to establish and consummate financial management information system and to set up information safety system completely for its safe and reliable running.
应用推荐