• 无论如何这项研究提供信息评估手机使用安全中具有巨大的价值

    However, this study provides information that will be of great value in assessing the safety of cell phone use.

    youdao

  • 本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    The main research content of this paper is network information detection technology and network security evaluation method.

    youdao

  • 本文基于风险评估技术主动防御策略引入电力信息网络安全防护中。

    This paper introduces the active defense policy based on risk assessment technology into safe protection of electric power information network.

    youdao

  • 传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    youdao

  • 所以,对安全监测信息使用安全监测系统应用主要瓶颈,需要研究如何利用安全监测信息结构安全状态进行实时和定量的评估

    Thus the evaluation of the safety of the structure, based on the monitoring information, is a bottleneck of the development of the monitoring system.

    youdao

  • 第三部分论文着重研究了一种基于资产威胁弱点信息安全风险评估量化模型

    In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.

    youdao

  • 网络拓扑发现通过收集网络传输信息研究网络连通结构一项技术网络管理网络安全评估发面具有重要意义

    Network topology discovery is a technology that research for network structure by collecting network transmission data, which is important in network management and network security evaluation.

    youdao

  • 因此模型中的信息收集以后可以用来进行攻击测试评估网络安全水平

    Thus, information gathered in the model can later be used to conduct testing attacks in order to evaluate the network security level.

    youdao

  • 基于前面关键技术,第四详细设计基于信息探测网络安全评估系统的方案给出了具体实现的方法

    According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.

    youdao

  • 网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    youdao

  • 风险评估作为信息安全管理重要环节,对保障企事业的基础信息系统安全有着非常重要作用

    As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.

    youdao

  • 信息安全风险评估信息系统安全工程重要组成部分,也是建立信息安全保障体系的基础。

    Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.

    youdao

  • 首先信息安全风险评估流程入手着重叙述信息安全风险评估过程风险计算的原理步骤

    At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.

    youdao

  • 算法贝耶斯推理处理不确定信息量化地评估系统安全状态并且有效地消除报。

    The algorithm handles uncertain information with Bayesian inference, giving a quantitative evaluation of the security state of a system and eliminating false alarms effectively.

    youdao

  • 正在考虑创建一所新的大学校园你们任务大学信息技术(IT)安全风险评估建立模型

    The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.

    youdao

  • 负责公司的信息系统安全评估控制风险制定安全政策、制定灾难恢复计划确保政策与计划执行。

    Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.

    youdao

  • 最后利用安全信息关联融合结果进行量化的实时安全风险评估

    Finally, a real-time risk evaluation method is introduced utilizing the result of information correlation and information fusion.

    youdao

  • 提出信息系统安全评估准则标准理论结构上还成熟,而且可操作性

    Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.

    youdao

  • 为了保障移动通信信息系统安全制定有效的操作性的、安全风险评估体系当务之急。

    To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.

    youdao

  • 通过调研所得数据进行收集归纳比较分析,本文提出了基于ISO 27000针对复合图书馆信息安全风险评估实施模型

    According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.

    youdao

  • 针对这个问题,设计实现了基于信息技术安全评估准则(通用标准)的系统评估方法软件

    To the question, the paper presents a system evaluation method and software based on the evaluation Criteria for Information Technology Security (Common Criteria).

    youdao

  • 本文论述开放系统互联安全体系结构重钢信息网络安全现状分析风险评估

    The article deals with the current analysis and risk evaluation of CISC (Chongqing Iron and Steel Company)'s information internet security under the opening systematic co-action secure structure.

    youdao

  • 介绍了对一个灾难指挥系统地震信息安全计划 自我风险评估

    Self-risk evaluation of the seismic information safety plan of the command system during a disastrous event is also discussed.

    youdao

  • 文章火星探测任务背景,介绍了两种用于实时地形安全评估的基于多敏感器的地形信息融合分析技术

    In the context of Mars exploration mission, this paper introduced two terrain information fusion analysis methodologies for real-time safety assessment.

    youdao

  • 风险评估必须用到评估工具完成对信息保护的工作,从而建立信息安全管理体系

    Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.

    youdao

  • 传统风险评估中,粒度评估结果不能安全管理员提供切实有用的信息

    For the conventional security risk assessment, the results by large granularity assessment can't provide security administrators with much effective and applicable information.

    youdao

  • 传统风险评估中,粒度评估结果不能安全管理员提供切实有用的信息

    For the conventional security risk assessment, the results by large granularity assessment can't provide security administrators with much effective and applicable information.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定