According to the design requirements of safety technology, the establishment of industrial control information security management platform.
按照等级保护安全技术设计要求,建立工业控制信息安全管理平台。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
Corrigendum 1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.
本文从管理、流程、技术、教育、审计等方面出发,通过对多项措施的有机结合,为企业打造一个良好的信息安全体系。
In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.
并从管理、技术角度出发,提出了相应的解决方案,以消除医院信息系统的安全隐患。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.
本文就信息安全威胁、信息安全技术和信息安全管理对校园网的信息安全进行探讨。
The factory did not regularly hold meetings that are attended by senior management to address information technology issues, including system security.
工厂没有定期举行高级管理人员参加的会议,以解决信息技术问题,包括系统的安全性。
The company regularly holds meetings that are attended by senior management to address information technology issues, including system security.
该公司定期举办高级管理人员参加的会议,以解决信息技术问题,包括系统的安全性。
1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.
开放式的架构系统,且与大约30个技术合作伙伴有着密切的合作,包括视频管理,访问控制和实体安全信息管理系统。
Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.
确定几种类型的安全管理策略和防御,并说明如何利用它们,以确保安全,业务应用信息技术。
Study of Confidential Information Security Management Systems for High-technology Firms.
高科技企业机密资讯安全内部控制制度之研究。
Study of Confidential Information Security Management Systems for High-technology Firms.
高科技企业机密资讯安全内部控制制度之研究。
应用推荐