F. Security audit engagements.
安全审计业务。
Firstly, the notion of distributed security audit system is introduced.
首先阐述了分布式安全审计的概念。
Security audit technique is used to solve the security problems in the internal network.
安全审计技术用来解决内部网络的安全问题。
The model integrates one backup-restore and data mining module for the data of security audit.
该模型针对安全审计数据,融合了一个备份恢复和数据挖掘模块。
More and more people pay attention to mail security audit, and the correlated work is carrying on.
邮件安全审计被越来越多的人关注,并且的相关的工作也持续在进行。
Security audit catch more and more attentions. But most distributed security audit systems are immature.
安全审计愈来愈受关注,但是大多数分布式安全审计系统仍不成熟。
Security audit system deters the staff from doing illegal operations and guarantees the internal security.
安全审计系统对内部人员的违规操作起到了威慑作用,保证了内网安全。
The research and application of network concentration security audit system is becoming the focus of world.
网络集中安全审计系统的研究与应用已经成为国内外研究的热点。
Working direction: security architecture specification, security architecture design, security audit, etc...
工作方向:安全架构规范制定、安全架构设计、安全审计等。
Network security Audit is an important factor of security management, it record the action of user in this system.
网络安全审计是实现安全管理的最重要的因素,它是一个安全的网络必须支持的功能特性。
Intrusion detection technology is the core technology security audit is one of the important network security components.
入侵检测技术是安全审计中的核心技术之一,是网络安全防护的重要组成部分。
In order to solve these problems, the dissertation works out a scheme of the network security audit based on data mining and realizes it.
为了解决这些问题,本文提出了基于数据挖掘的网络安全审计系统的方案并加以实现。
However, there are some problems in the process of network security audit such as low rate of accuracy, slow speed and poor self-adaptability.
但目前在安全审计过程中普遍存在着检测准确率低、检测速度慢和自适应性差等问题。
Learning of association rules is a new method to discover new knowledge and has been a significant aspect of the study on network security audit.
关联规则学习是一类新型的知识发现方法,已成为网络安全审计的重要研究方向。
The digital rights management security audit log descriptive model presents what will be recorded by digital rights management security audit log.
数字权限管理安全审计日志记录的内容由数字权限管理安全审计日志描述模型给出。
Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.
通过对测试结果的分析,验证了将数据挖掘理论融入安全审计分析是可行和有效的。
Application and data security make up of authentication, access control, security audit, data security, data integrality, data consistency and so on.
其中应用和数据安全主要包括身份认证、访问控制、数据完整性、保密性、一致性和安全审计等。
Finally, basing on the core idea of improved association rule learning algorithms, this thesis designs and achieves simple models of network security audit.
最后根据改进的关联规则学习算法的核心思想,对网络安全审计模型进行了设计,并给予实现。
This paper studies related technologies and standards of security auditing, designs and implements a security audit system for various types of applications.
本文通过研究安全审计的相关技术和标准,设计并实现了一个针对各类应用系统的安全审计系统。
Among the control challenges are insufficient security audit possibilities, and the fact that certification schemes and security metrics aren't adopted to cloud computing.
控制方面的课题有:安全审计不足的可能,以及认证方式和安全度量在云计算中没有得到采用这样一个事实。
Grid is different from the distributed system, it's sweeping and its configuration is more complex, so the demand to the log system and the security audit is also higher.
网格不同于传统的分布式系统,网络规模更大,结构更加复杂,对日志系统和安全审计也提出了更高的要求。
The experiments show that the fragment audit model could improve the discernment precision of security audit systems efficiently and eliminate the fragment semantic ambiguity.
从实验结果中看出,该模型能有效提高安全审计系统的识别精度,消除分片语义歧义性。
Secondly, it puts forward a solution of network security audit based on data mining and builds a system model to solve the problems existing in current network security audit.
其次根据目前网络安全审计中存在的问题提出了基于数据挖掘的网络安全审计系统的实现方案并建立了系统模型图。
As one of the important mechanisms implementing network information security, security audit has a significant effect on establishing a set of network security assurance system.
安全审计作为实现网络信息安全的重要机制之一,对建立完善的信息安全保障体系具有重要的作用。
In addition, regulators could require large companies to undergo an annual information-security audit by an accredited third party, similar to financial audits for listed companies.
另外,规则的制定者应要求大公司通过由授信第三方实施的年度信息安全审核,就像对指定公司进行年度财政审核那样。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
We focus on addressing the problems that exist in some current distributed Security Audit System, for instance, high false alerting rate and too big network communication load, etc.
对目前一些分布式安全审计系统所存在的虚报率高、单点失效、网络通信负载过重等问题进行了改进。
Application results show that this system achieves the security audit function of LAN and provides basis for taking more security measures. Besides, it possesses good transportability.
应用结果表明,系统既实现了局域网络的安全审计功能,又为局域网络采取进一步的安全措施提供了依据,并且具有较好的可移植性。
Application results show that this system achieves the security audit function of LAN and provides basis for taking more security measures. Besides, it possesses good transportability.
应用结果表明,系统既实现了局域网络的安全审计功能,又为局域网络采取进一步的安全措施提供了依据,并且具有较好的可移植性。
应用推荐