To coordinate the building of state information security protection system;
协调国家信息安全保障体系建设;
The machine is equipped with control panel box , security protection system and powerful suction motor fan.
我们为客户配置电电控箱、相关的安全保护器和大功率、高性能的排风机。
Intrusion detection is an essential component of information security protection system, which guarantees the security of the network resource.
入侵检测是信息安全保护体系中的一个重要组成部分,确保计算机网络资源的安全性。
The central part of intelligent security protection system is signal collecting and processing, among which the intrusion detector is a key part.
智能化安全防范系统的核心是信息采集与处理,其中入侵探测器是进行信息采集的关键部件。
Based on analyzing various security threats faced by the wireless network, this paper discusses on the principles and methods for constructing the wireless network security protection system.
在分析无线网络所面临的各种安全威胁的基础上,讨论了构建无线网络安全防护体系的原则和方法。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
All security features needed to provide an acceptable level of protection for hardware, software, and classified, sensitive, unclassified or critical data, material, or processes in the system.
用于对系统中硬件、软件、机密、敏感、不机密,或关键性的数据,材料或过程提供可接受的水平的保护的所有安全特性。
This model USES Encryption Support Layer, security Protection and Reliability Support Layer to guarantee the system security and stability in different aspects.
模型采用密码支撑层、安全防护与可靠性支持层保证系统不同层面的安全性与可靠性。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
The security model of the proxy server based on PDRR consists of protection system, detection system, response system, recovery system and expert system.
基于防御-检测-响应-恢复的代理服务器安全模型由防御、检测系统、响应系统、恢复系统和专家系统组成。
With function of protection ring and security kernel, a novel model for enhancing security of operating system is proposed.
利用保护环和安全内核的功能,提出了一种新的增强操作系统安全性的模型。
Vulnerability repair of electric power production and control area secondary system is a necessary and important part of security protection work.
电力生产控制区二次系统漏洞修补属于安全防护工作中必不可少的重要组成部分。
The speed, sensitivity and reliability of transformer protection improve with the higher requirement of the power system security.
随着电网对安全性要求的提高,对电力变压器保护的速动性、灵敏性、可靠性要求也越来越高。
Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.
有些文献将这些保护数据、阻挡非法数据访问的技术统称为计算机安全或系统安全技术。
The invasion detection system is one kind of initiative protection network resources network security system, in recent years, we obtained extensive research and the application.
入侵检测系统是一种主动保护网络资源的网络安全系统,近年来得到了广泛的研究与应用。
This paper probes emphatically into some countermeasures for maintaining the security of the public computer software system by using the software protection methods.
鉴于此,重点探讨了利用软件保护方法维护公用计算机软件系统安全的对策。
A mass of practice prove that it is not enough to ensure the security of network system only depending on traditional passive protection.
大量的实践证明,保障网络系统的安全,仅仅依靠传统的被动防护是不够的。
These mechanisms can provide dual fine grain protection and enhance the system scalability and security.
本系统能提供细粒度的安全保护,提高了系统的可扩展性和安全性。
Security measures are provided for personnel, user accounts, system policies, data protection, and virus prevention.
对人员、用户帐号、系统策略、数据保护、病毒防治制定了详细的安全措施。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
The control system of security interlocking protection consisting of PLC and upper computer is introduced.
介绍了由PLC及上位机组成的安全联锁保护控制系统。
To study the protection technology and predict and analyze the behaviors of an operating system is the important content of the security of the operating system.
研究操作系统的安全防护技术,预测分析操作系统的安全行为,是操作系统安全的重要内容。
It is applied in relay protection, system metering and analysis of power system. It has a close relation with the security and reliability of power system.
它被广泛应用于继电保护、系统监测、电力系统分析之中,关系到电力系统的安全性与可靠性。
The importance of the satellite-carried information security assurance system (SCISAS) to the information protection of satellites is set forth.
阐述了星载信息安全保障系统对卫星自身信息安全防护的重要意义。
More detailed analyses are given in these aspects: the campus network plan, topology, the function of the business application system, and security protection and management.
提出了新校园网建设的需求,从校园网的网络规划、拓扑结构、业务应用系统功能、安全保障和安全管理等方面进行了详细分析;
More detailed analyses are given in these aspects: the campus network plan, topology, the function of the business application system, and security protection and management.
提出了新校园网建设的需求,从校园网的网络规划、拓扑结构、业务应用系统功能、安全保障和安全管理等方面进行了详细分析;
应用推荐