• The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.

    公司信息安全团队几乎立即发现攻击采取积极行动保护所有系统数据

    youdao

  • The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.

    公司信息安全团队几乎立即发现攻击采取积极行动保护所有系统数据

    youdao

  • This is because privacy and security of data are of utmost importance; all data stored in AMEE is anonymized, so you cannot retrieve profile data based on personal information.

    是因为数据隐私数据安全今天重要存储AMEE中的所有数据都匿名的,因此不能根据个人信息检索配置文件数据。

    youdao

  • New principles for an age of big data sets will need to cover six broad areas: privacy, security, retention, processing, ownership and the integrity of information.

    对于数据时代原则涵盖以下六个广泛领域隐私安全产权保持力处理拥有信息完整性

    youdao

  • In a traditional desktop environment, user data is often stored on the device, leading to challenges about the security and protection of user private information and corporate intellectual property.

    传统桌面环境中用户数据常常存储用户设备上,这会在用户私有信息公司智能资产安全性方面造成问题

    youdao

  • From a security perspective, all interfaces have the potential to expose sensitive information and possibly receive malicious data.

    安全角度看所有接口可能暴露敏感信息接收恶意数据

    youdao

  • Decentralized Information flow control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world.

    DIFC这种安全手段应用程序作者能够控制应用的组成部分外部世界之间数据如何流动

    youdao

  • The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.

    如果没有完善设计安全性事件收集分析架构存储检索理解这样巨大信息量非常困难的。

    youdao

  • The Raytheon High-Speed Guard CENTAUR component validates security, ISR information markings and data structure prior to transferring the information between security domains.

    雷神公司CENTAUR系统的高速防卫组件安全之间传输信息之前验证情报安全性ISR信息标记数据结构

    youdao

  • Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.

    现今资料存取控制精细个别资料中的资讯以便为重要资料机密客户资讯,提供更严密安全防护

    youdao

  • Having data housed elsewhere may also bring up security and compliance issues with some types of information and legal issues with others.

    数据保存在别的地方一些类型信息可能会面临安全或者服从法律问题,机构之间有可能会出现法律纷争

    youdao

  • The <wsse:Security> header within the SOAP message holds all the run-time security configuration information and signature data.

    SOAP消息中的 <wsse:Security>头部保存所有运行时安全配置信息签名数据

    youdao

  • The threat today is not simply about vandalism but outright theft of confidential information, such as credit-card Numbers, social-security details, financial data, marketing plans and trade secrets.

    如今只是简单地破坏、进而更盗取泄漏保密信息信用卡号码身份证号码、金融数据营销计划商贸机密

    youdao

  • Your Notes application should also treat the user's data (ID file and password) securely as it is security-sensitive information.

    Notes应用程序应该安全地处理用户数据(ID文件密码),因为这些用户数据对安全性非常敏感的信息。

    youdao

  • Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.

    具体而言智慧城市可能遇到信息安全问题分为网络安全、系统安全、数据安全和综合安全。

    youdao

  • The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.

    数据库所有信息系统核心,数据库的安全通常其中所存数据的安全,是网络安全、信息安全的重要组成部分

    youdao

  • The construction of information security is based on the business requirements, which can be combined with the internal needs of the nuclear power plant, and the external data transmission needs.

    信息安全建设业务需求作为驱动导向,结合核电厂内部业务需求对外传递数据需求,方可妥当地进行安全架构设计。

    youdao

  • The key lies in the completion of data processing, analysis, coupling, the premise of the transfer, and the transmission of data must be built on the basis of information security.

    关键在于完成数据处理分析耦合,其前提“传递”,数据传递建立信息安全基础之上。

    youdao

  • However, the problems such as low data quality, sensitive data leakage, external malicious theft and so on, it is urgent to study the effective information security strategy.

    然而数据质量低下敏感数据外泄外部恶意窃取问题随之而来,研究行之有效信息安全策略刻不容缓

    youdao

  • At the same time, due to the lack of user data backup and other data security knowledge and means, it will result in the loss of recurring information and other phenomena.

    同时由于用户缺乏数据备份数据安全方面知识手段因此造成经常性信息丢失现象发生

    youdao

  • Confidential data, business data and other sensitive information on network security put forward higher request.

    机密数据商业数据敏感信息网络安全提出更高要求

    youdao

  • In structure design, data relay, parameters selection of TAT and the correct analysis of output information, so guarantee the security of the project structure design.

    结构设计时,TAT数据接力参数合理选取输出信息正确分析、判断,是保证工程结构设计安全的关键。

    youdao

  • NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.

    NET构建了学校信息管理系统本文介绍系统的整体设计数据库访问方法数据安全防范措施

    youdao

  • Due to environment and data processing, there are security risks in the electronic data processing accounting information system.

    由于环境性数据处理等方面原因,电算化会计信息系统存在安全风险

    youdao

  • Security measures of the enterprise information system data were discussed in this article on protecting data and system.

    保护数据和主机系统角度,阐述企业信息系统数据的安全保护措施

    youdao

  • The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.

    企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制管理控制。

    youdao

  • As the data and information primary storage mode, the security of the database is an important part of accounting information system.

    会计信息系统数据库作为数据信息主要存储方式安全控制问题系统构建的关键

    youdao

  • Data management, information (security), resource management and information service form the core of grid basic infrastructure together.

    数据管理信息安全资源管理信息服务共同组成网格基础设施的核心

    youdao

  • This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.

    本文详细描述具体功能结构的设计实现,包括网络数据存储方案信息安全实现关键技术

    youdao

  • This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.

    本文详细描述具体功能结构的设计实现,包括网络数据存储方案信息安全实现关键技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定