具有必备的服务设备和完善的数据安全保护措施;
They have the necessary service facilities and shall take effective measures to ensure the security of their data.
涉及保护数据和人员的网络安全正面临多重威胁,尤其是网络犯罪和网络行业间谍,这两种威胁都在迅速增长。
Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
数据保护,包括添加安全策略,可以在创建表时进行,也可以在创建表之后通过修改表来实现。
Data protection, including adding a security policy, can be done when creating the table or later by altering the table.
这些策略由安全服务器集中管理,并且发送到根据需要保护数据的代理。
The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.
另外,还要求管理员角色用传统的方式访问安全信息(密码、密钥文件等等)以更好地保护敏感数据。
In addition, the administrator role is required to access traditionally secure information (passwords, key files, etc.) to provide better protection to sensitive data.
另外,所有XML数据都受到用于保护传统关系数据的安全和数据完整性控件的保护。
In addition, all XML data is protected by the same security and data integrity controls that protect the traditional relational data.
这些专业人员专门处理安全问题,能够提供不同寻常的建议来保护数据避免未经授权的访问。
Dedicated to security matters, these professionals can offer unconventional advice for securing data from unauthorized access.
这种在文件中储存数据的方法是一种比较安全的保护隐私性的方法(记住,如果S3密匙被盗,您将为他人购买带宽)。
This method of storing the data in a file is a fairly safe way of protecting secret values (remember, if your S3 keys get stolen, you'll be paying for someone else's bandwidth).
在第二幕中,PaaS安全策略的重点是保护数据,此外,还负责管理对应用程序的访问。
In this second act, the PaaS security policy focuses on protecting data in addition to managing access to applications.
Kerberos是用于网络身份验证和保护数据传输的最流行的安全机制。
Kerberos is a popular security mechanism used by systems for network authentication and secure transmission of data.
如果用户拥有安全策略使用的每个规则的豁免权,那么该用户将拥有受那个安全策略保护的所有数据的完全访问权。
If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
确保机密信息的安全和保护客户的个人数据是每个企业的重要目标。
Securing confidential information and protecting the personal data of customers are important objectives for every enterprise.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
The database security administrator allows users access to protected data by granting them security labels.
当一个用户试图访问受保护的数据时,必须将他的安全标签与保护数据的安全标签进行比较。
When a user tries to access protected data, his security label is compared to the security label that is protecting the data.
安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
The security administrator allows users access to protected data by granting them security labels.
然而,由负责保护数据安全的组织管理的内部审核以及变更流程,可帮助防止安全缺失。
However, internal reviews and change processes, managed by the organization responsible for safeguarding the data, help prevent security misses.
在服务和属性级别上启用身份验证的业务服务,支持主数据的私密性和安全性,因为它需要保护和治理。
Business services that are enabled to implement authorization on service and attribute level, supporting privacy and security aspects of the master data since it needs to secured and governed.
豁免权使用户可以访问其安全标签不允许其访问的受保护数据。
An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing.
数据保护是一系列计算出的风险,像快照、连续数据保护(CDP)、复制和RAID技术都无法提供绝对的安全保障。
Data protection is always a series of calculated risks, and even such technologies as snapshots, continuous data protection (CDP), replication, and RAID are not absolute guarantees of security.
磁带提供与磁盘系统不同的技术区别,离线备份能够解决安全和数据保护问题。
Tape provides another technical differentiator from disk systems that addresses both security and data protection concerns: a completely offline copy of data.
美军这才意识到他们得保护usb硬盘的数据安全,找出能够跟踪这些设备的方法,并且确保重要信息不被未经授权的员工访问。
The US Army realized they had to secure USB drives, find a way to keep track of the devices, and ensure that the information could not be accessed by unauthorized personnel.
美军这才意识到他们得保护usb硬盘的数据安全,找出能够跟踪这些设备的方法,并且确保重要信息不被未经授权的员工访问。
The US Army realized they had to secure USB drives, find a way to keep track of the devices, and ensure that the information could not be accessed by unauthorized personnel.
应用推荐