The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
This is because privacy and security of data are of utmost importance; all data stored in AMEE is anonymized, so you cannot retrieve profile data based on personal information.
这是因为数据隐私和数据安全在今天很重要,存储在AMEE中的所有数据都是匿名的,因此不能根据个人信息检索配置文件数据。
New principles for an age of big data sets will need to cover six broad areas: privacy, security, retention, processing, ownership and the integrity of information.
对于大数据集时代的新原则需涵盖以下六个广泛的领域:隐私、安全、产权保持力、处理、拥有和信息的完整性。
In a traditional desktop environment, user data is often stored on the device, leading to challenges about the security and protection of user private information and corporate intellectual property.
在传统的桌面环境中,用户数据常常存储在用户的设备上,这会在用户私有信息和公司智能资产的安全性方面造成问题。
From a security perspective, all interfaces have the potential to expose sensitive information and possibly receive malicious data.
从安全角度看,所有接口都可能暴露敏感信息并接收恶意数据。
Decentralized Information flow control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world.
DIFC这种安全手段,让应用程序的作者能够控制应用的组成部分与外部世界之间数据如何流动。
The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.
如果没有完善设计的安全性事件收集和分析架构,存储、检索和理解这样巨大的信息量是非常困难的。
The Raytheon High-Speed Guard CENTAUR component validates security, ISR information markings and data structure prior to transferring the information between security domains.
雷神公司CENTAUR系统的高速防卫组件在安全域之间传输信息之前,验证了情报的安全性、ISR信息标记和数据结构。
Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.
现今的资料存取控制可精细到个别资料格中的资讯,以便为重要资料及机密客户资讯,提供更严密的安全防护。
Having data housed elsewhere may also bring up security and compliance issues with some types of information and legal issues with others.
把数据保存在别的地方,一些类型的信息可能会面临安全或者服从法律的问题,机构之间也有可能会出现法律的纷争。
The <wsse:Security> header within the SOAP message holds all the run-time security configuration information and signature data.
SOAP消息中的 <wsse:Security>头部保存有所有运行时安全配置信息和签名数据。
The threat today is not simply about vandalism but outright theft of confidential information, such as credit-card Numbers, social-security details, financial data, marketing plans and trade secrets.
如今它不只是简单地破坏、进而更盗取和泄漏保密信息,如信用卡号码、身份证号码、金融数据、营销计划和商贸机密。
Your Notes application should also treat the user's data (ID file and password) securely as it is security-sensitive information.
Notes应用程序也应该安全地处理用户数据(ID文件和密码),因为这些用户数据是对安全性非常敏感的信息。
Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.
具体而言,智慧城市可能遇到的信息安全问题分为网络安全、系统安全、数据安全和综合安全。
The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.
数据库是所有信息系统的核心,数据库的安全通常是指其中所存数据的安全,是网络安全、信息安全的重要组成部分。
The construction of information security is based on the business requirements, which can be combined with the internal needs of the nuclear power plant, and the external data transmission needs.
信息安全的建设以业务需求作为驱动导向,结合核电厂内部业务需求、对外传递数据需求,方可妥当地进行安全架构设计。
The key lies in the completion of data processing, analysis, coupling, the premise of the transfer, and the transmission of data must be built on the basis of information security.
其关键在于完成数据的处理、分析、耦合,其前提在“传递”,而数据的传递须建立在信息安全基础之上。
However, the problems such as low data quality, sensitive data leakage, external malicious theft and so on, it is urgent to study the effective information security strategy.
然而数据质量低下、敏感数据外泄、外部恶意窃取等问题随之而来,研究行之有效的信息安全策略已刻不容缓。
At the same time, due to the lack of user data backup and other data security knowledge and means, it will result in the loss of recurring information and other phenomena.
同时由于用户缺乏数据备份等数据安全方面的知识和手段,因此会造成经常性的信息丢失等现象发生。
Confidential data, business data and other sensitive information on network security put forward higher request.
机密数据、商业数据等敏感信息对网络安全提出了更高的要求。
In structure design, data relay, parameters selection of TAT and the correct analysis of output information, so guarantee the security of the project structure design.
在结构设计时,TAT的数据接力、参数合理选取和输出信息的正确分析、判断,是保证工程结构设计安全的关键。
NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.
NET构建了学校信息管理系统,本文介绍了系统的整体设计,数据库访问方法和数据安全防范措施。
Due to environment and data processing, there are security risks in the electronic data processing accounting information system.
由于环境性及数据处理等方面原因,电算化会计信息系统中存在安全风险。
Security measures of the enterprise information system data were discussed in this article on protecting data and system.
从保护数据和主机系统的角度,阐述了企业信息系统数据的安全保护措施。
The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.
企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制和管理控制。
As the data and information primary storage mode, the security of the database is an important part of accounting information system.
在会计信息系统中,数据库作为数据和信息的主要存储方式,其安全控制问题是系统构建的关键。
Data management, information (security), resource management and information service form the core of grid basic infrastructure together.
数据管理,信息安全,资源管理与信息服务共同组成了网格的基础设施的核心。
This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.
本文详细描述了其具体功能结构的设计和实现,包括网络数据存储方案和信息安全实现等关键技术。
This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.
本文详细描述了其具体功能结构的设计和实现,包括网络数据存储方案和信息安全实现等关键技术。
应用推荐