CISSP(信息系统安全认证专家)。
CISSP (Certified Information Systems Security Professional).
第二十六条信息系统安全等级保护定级备案和测评整改。
Twenty-sixth Information System Security Grading Protection filing and evaluation rectification.
商务信息系统安全的核心目标是维持系统数据的完整性。
The key of security on commercial information systems is to preserve the data integrity within them.
信息系统安全的前提是确保安全策略的完备、正确和一致。
It is the precondition for the security of information systems to assure the completeness, correctness and consistency of security policies.
信息系统应用过程审计是一种有效的信息系统安全保障手段。
Process audit software on information system applications is effective means in ensuring security of information systems.
企业网络服务器完整性是企业信息系统安全保障的重要内容之一。
Integrality of server in company was one of the important contents of secure safeguard in company information system.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
实例分析表明,该方法合理有效,可为信息系统安全风险评估提供新思路。
Finally, an illustrative instance is given to demonstrate its rationality and feasibility. Thus it may provide a new way for assessing information systems security.
电子商务安全从整体上可分为计算机信息系统安全和商务交易安全两大类。
The electronic commerce safety can be divided into two major type: the computer information system safety and The electronic commerce business safety from the whole to trade.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
市主管部门应当监督、指导计算机应用单位建立和完善计算机信息系统安全保障体系。
The municipal competent authority shall supervise and instruct the application unit to set up and perfect the safeguard system of computer information system.
近年来,入侵检测系统IDS作为信息系统安全的重要组成部分,得到了广泛的重视。
In recent years, intrusion detection system (IDS), being the important part of the information security system, has gained extensive attentions.
已提出的信息系统安全评估的准则和标准在理论结构上还不成熟,而且可操作性不强。
Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.
安全体系结构是构建安全信息系统的支撑框架,是主导信息系统安全开发的重要指南。
Security architecture is a base framework for building secure information systems and an important guideline for leading security development.
论述了从产品安全、网络安全和管理安全面性个层面实现证券信息系统安全运营的方法。
The author discusses the methods to realize safe running of security information system from aspects of product security, network security and management security.
本文还给出了信息系统安全保障体系的规划方式,构建信息系统安全保障体系实施策略。
The paper also presents the layout of security safeguard system of information system and discusses implement policy of security safeguard system of information system.
确保公司信息系统安全的第一步,可能难于启口,就是要承认这项工作永远也不会结束。
As hard as it might be to swallow, the first step to securing your company's information systems is admitting that the job will never be finished.
同样,有网络和无线安全技能的人群以及那些具有认证信息系统安全专业证书的也备受青睐。
There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.
目前,提出的方法中定性的方法比较多,而结合信息系统安全评分与审计决策的方法较少。
At present, there are more qualitative techniques presented, and less quantitative techniques combining audit decision with safety judgment on information systems.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
对信息系统安全种类进行了划分,对各种攻击原理进行了分析并提出了防范措施和解决方案。
The category of the security of information system is classified. With each kind of attack principle analysed, the precaution measures and the solutions are brought up.
对企业信息系统安全构成威胁的因素很多,包括灾难、系统安全问题、系统错误与质量问题。
There are many factors threatening the enterprises information systems, such as disasters, system security problems, system mistakes and quality problems.
长期以来,人们针对信息系统的安全问题作了大量研究,已经有许多成熟的信息系统安全模型。
A lot of work has been done towards the higher security of information system, and many mature information system prototypes have been developed.
并由此确定了认证、访问控制和信息传输安全三项信息安全机制作为信息系统安全的基本要素。
Under the framework, three mechanisms, authentication, access control and information transmission safety, are identified as the essential elements.
信息安全风险评估是保证信息系统安全保密的重要手段,是涉密信息系统风险管理的重要内容。
Information security risk assessment is an effective way to protect the security of secret-involved information system.
通过研究,本文对陕鼓信息系统安全管理有指导作用,对制造型企业信息系统安全管理有借鉴作用。
Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.
访问控制作为国际化标准组织定义的五项标准安全服务之一,是实现信息系统安全的一项重要机制。
Access control, as one of 5 standard security services defined by ISO, is an important mechanism for security of information systems.
企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制和管理控制。
The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.
第二部分,通过对数据及信息系统安全的探讨得出列车运行图信息系统的安全模型,包括第三、四章。
Unit 2: This unit includes chapter 3 and chapter 4. The security model has been designed by the studies on the security of the data and information system.
第二部分,通过对数据及信息系统安全的探讨得出列车运行图信息系统的安全模型,包括第三、四章。
Unit 2: This unit includes chapter 3 and chapter 4. The security model has been designed by the studies on the security of the data and information system.
应用推荐