This article explains what the plug-in writer or database administrator should test before deploying the customized security plug-ins to the DB2 system.
本文阐述了将定制的安全性插件部署到DB 2系统前,插件编写人员或数据库管理人员应该测试的内容。
Note that a database administrator or system administrator does not possess the database security administrator authority by default.
注意,默认情况下数据库管理员或系统管理员并不拥有数据库安全管理员权限。
Managing security is a critical part of the job for any system administrator.
对于任何系统管理员来说,安全管理都是其工作中非常关键的一部分。
The database security administrator configures the LBAC system by creating security policies.
数据库安全管理员通过创建安全策略来配置LBAC系统。
This event should also be logged in the system, either by sending an email to the administrator, writing the event to a security log, or both.
这一事件也应该被记录在系统中,还要给管理员发送邮件,将事件写入安全日志。
Following the instructions provided, an administrator should be able to complete the outlined installation and apply basic security to their system in under an hour. Topics discussed include.
按照所提供的这篇指南,一名管理员应能在一小时内大致完成安装并对他们的系统应用基本的安全性。
Any communication between the secure partitions is controlled by security policies defined by the system administrator and enforced by LynxSecure.
分区之间的任何通信都由系统管理员遵循安全政策进行控制,由LynxSecure执行。
Each network administrator, system administrator, and program manager should be responsible for the security of the system itself.
每个网络管理员、系统管理员和程序管理员应对自身系统的安全负责。
The security policy returned an unknown error. Please contact your system administrator.
安全性策略返回未知错误。请与系统管理员联系。
If you are an administrator for multiple machines we strongly recommend you subscribe to this list to be notified of critical updates that may affect your system security.
如果您是很多台计算机的系统管理员我们极力的推荐您订阅列表。列表将提醒你那些可能影响到你的系统安全的关键升级。
If the trusted PC works the way it should, an inexperienced or lackadaisical administrator won't be able to unwittingly compromise system or network security through inefficient policies.
如果信任电脑作品它应该的方式,一个没有经验的或懒洋洋的管理员不会能够无意中妥协通过低效的系统或网络安全政策。
The main difference between URA and it's revocation in delegation and RBAC is that the former is mainly performed by delegator and the latter by system administrator or security administrator.
与RBAC中URA的主要不同在于委托中的URA及其撤销主要是由委托者自己完成,而RBAC中的URA及其撤销主要是由系统管理员或安全管理员完成。
Testing the correctness of the system configuration and security holes, and prompts the administrator to fix vulnerabilities.
检测系统配置的正确性和安全漏洞,并提示管理员修补漏洞。
Testing the correctness of the system configuration and security holes, and prompts the administrator to fix vulnerabilities.
检测系统配置的正确性和安全漏洞,并提示管理员修补漏洞。
应用推荐