A review of security requirements and implementation is an important part of this stage of the assessment.
对安全需求和实现的检查是这一阶段评估的重要部分。
The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.
风险、培训和文化:执行风险评估和容纳计算机及网络基础结构的设施的物理安全性评估。
The latest Home Office estimate for the number of innocent people on the DNA database is 980, 000 according to the crime and security bill regulatory impact assessment published last Friday.
按照上周五公布的犯罪和安全法案管理影响评估的说法,内政厅对DNA数据库内无辜人数的最新估计值为980 000人。
This article briefly covers important aspects of cloud service security issues and then describes the mitigating risks that are part of a risk assessment program.
本文简要讨论云服务安全问题的重要方面,然后描述风险评估和降低风险的步骤。
As honest as that assessment was, it will be difficult for the Mexican public to swallow if they don't see immediate results in policing and security.
这个推断很坦率,而如果不在警察和安全方面看到即刻的成效,那么同样坦率的一点就是,墨西哥公众很难接受这个推断。
Econolite’s StrongPoint network security appliance was recently the subject of an ITS network vulnerability assessment and penetration test performed by Sword & Shield Enterprise Security.
美国Econolite公司开发的StrongPoint网络安全装置最近接受了Sword&Shield企业安全公司的智能交通系统(ITS)易损性评估和渗透性试验。
In the fourth step, you periodically reassess risk assessment program as impacted by new risks, cost-effective security controls, emerging infrastructure technologies, and new legislations.
在第四步中,定期地重新评估风险,因为新的风险、安全控制措施、基础设施技术和法律会影响安全状况。
Influence on human health entailed general assessment of potential risks and specific assessment of human security, with direct and indirect influences analyzed.
对人体健康的影响需要进行潜在风险总体评估和人体安全专项评估,分析了直接影响和间接影响。
Its result indicates that causality diagram is more effective than FTA in security analysis and assessment.
结果表明因果图方法可以有效地进行安全分析和安全评估,而且比故障树分析法效果好。
Dynamic security region (DSR) is a more scientific and effective method for real-time security monitoring, assessment and control of power systems, compared with traditional "point-wise" approaches.
动态安全域的方法可使电力系统实时安全监视、防御与控制更科学、更有效,有着广阔的在线应用前景。
Analyzing the essential characteristic of the network security situation assessment, and the reasoning model is proposed.
分析了网络安全态势估计问题的本质特征,构造了网络安全态势推理评估的求解模型。
The best way to choose security products and services for the enterprises to begin, not by studying the technology options, but with an assessment of security needs.
对企业来说,选择安全产品和服务的最佳方法是先开始评估安全的需求,而不是研究选用哪种技术。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
The paper articulates the status quo of security management and assessment of water projects and technologies of detecting, monitoring and resolving hidden problems.
对水工程安全管理与评价、隐患监测探测和治理技术应用的现状进行了简要概述和分析;
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
The thesis systematic summarized predecessor's research results, carried on a comprehensive summary and narration to water security implication and water security assessment method.
本文较系统的总结前人的研究成果,对水安全涵义、水安全评价方法进行了较为全面的总结与评述。
Segment information helps improve the predictive ability of information users, and has decision availability in security pricing and risk assessment.
分部信息有助于改善信息使用者的预测能力,并在证券评价、风险评估方面具有决策有用性。
As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.
而风险评估作为信息安全管理的一个重要环节,对保障企事业的基础信息系统安全有着非常重要的作用。
In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.
第三部分,论文着重研究了一种基于资产、威胁和弱点的信息安全风险评估量化模型。
The proposed method can filter harmless contingencies correctly and quickly and can meet the requirement of quickness of online dynamic security assessment.
该方法滤除系统不严重事故的准确性较高,计算速度快,可以满足在线动态安全评估快速性的要求。
The condition and approach of predigestion computation isp ut forward. Its result indicates that causality diagram is more effective than FTA in security analysis and assessment.
结果表明因果图方法可以有效地进行安全分析和安全评估,而且比故障树分析法效果好。
Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.
风险评估必须用到评估工具来完成对信息保护的工作,从而建立信息安全的管理体系。
The assessment team says the African migrants are in desperate need of help. It says they are living under basic shelter and without access to running water, sanitation, electricity or security.
评估小组说,这些非洲移民迫切需要援助,他们的容身之处非常简陋,营里没水没电,缺乏卫生设备和安全设施。
At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.
首先从信息安全风险评估的流程入手,着重叙述了信息安全风险评估过程中风险计算的原理和步骤。
The difficulties in the research are concerned with the establishment of a scientific and workable index system of mineral resources security assessment.
矿产资源安全评价指标体系的科学化和操作化是当前研究的难点;
The difficulties in the research are concerned with the establishment of a scientific and workable index system of mineral resources security assessment.
矿产资源安全评价指标体系的科学化和操作化是当前研究的难点;
应用推荐