Chapter 3: authenticity of a listed company to disclose information system security.
第三章:上市公司信息披露真实性的制度保障。
Twenty-sixth Information System Security Grading Protection filing and evaluation rectification.
第二十六条信息系统安全等级保护定级备案和测评整改。
Because database is a set of information, database system security plays a crucial role on the information system security.
而数据库作为信息的载体,它的安全性对整个信息系统的安全起着决定作用。
This paper first introduces nowadays information system security certification and accreditation(C&A)process of American and our country.
该文首先简要介绍了美国的信息系统认证与认可过程和我国现阶段的信息系统测评认证的现状。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
Then, after SSE-CMM is explained, a risk-analysis-centric model of information system security engineering is established using system engineering theory.
在充分研究SSE CMM模型的基础上,采用系统工程的思想,建立了以风险分析为中心的信息系统安全生命期模型。
In the campus network application process, people tend to focus on network environment safety, and ignore the information system security precautions level.
在校园网应用过程中,人们往往侧重于网络环境安全,而忽视了信息系统层面的安全防范。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
The first chapter emphasizes on the importance of information system security. It introduces modern security management theories and the BS7799 security management standard.
第一章重点阐述信息安全管理的重要性,介绍现代安全管理思想,引入国外的BS 7799安全管理标准。
It will greatly assure the national information system security to construct and normalize the national information on the basis of constructing the information system security frame.
从构建信息系统安全架构的高度出发来全面构建和规范我国的信息安全,将有效的保障我国的信息系统安全。
The Information system Security management does not involve only the management system or only the relevant techniques, but includes the relevant strategies, management and techniques.
信息安全管理不单单是管理体制或技术问题,而是策略、管理和技术的有机结合。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
To evaluate the military information system security effectiveness, which involves many factors, is a complex problem, in which the information about specification is incomplete and vague.
军用信息系统效能评估是一个十分复杂的问题,涉及因素多,而且存在部分因素不完全和不确定的问题。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.
通过研究,本文对陕鼓信息系统安全管理有指导作用,对制造型企业信息系统安全管理有借鉴作用。
To evaluate the military information system security effectiveness, which is related to so many factors, is a complex question, in which the information about specification is incomplete and vague.
军用信息系统效能评估是一个十分复杂的问题,涉及因素多,而且存在部分因素不完全和不确定的问题。
While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.
而身份认证技术是网络安全和信息系统安全的第一道屏障,它是网络时代信息安全技术非常重要的一个研究领域。
In contrast, a system may require identifying information in order to handle matters such as security or quality of service.
相比而言,为了处理诸如安全或服务质量之类的事情,系统就需要标识信息了。
But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.
但是安全专家警告说攻击者可以利用他们在系统中的立足点偷窃用户和客户的信用卡账号和个人信息。
The server's security system validates the user against its security registry and obtains other security information about the user.
服务器的安全系统将针对安全注册中心对用户进行验证并获得关于用户的安全信息。
You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.
您也可以在得使您相信有人试图威胁系统安全的信息后,执行审计。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.
操作系统确认bob/bobpsw组合是否有效,把该信息返回给安全插件。
The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.
操作系统确认bob/bobpsw组合是否有效,把该信息返回给安全插件。
应用推荐