The previous researchers placed emphasis on research from one side of information security management, or technical details.
以往的研究者多侧重于从某个侧面研究一医院信息安全管理或技术细节。
5 take cases, role-playing and other teaching methods, focusing on the transmission of information security management experience;
采取案例、角色扮演等教学方式,注重信息安全管理实践经验的传递;
However, since no system can ever be 100 percent secure, a prevention-only approach to information security management is not enough.
然而,从来没有一些系统能保证100%的安全,仅仅阻止接近信息安全系统也是不够的。
The article depicts in detail about the content of the information security management system and its establishing methods approaches.
比较详细地介绍信息安全管理体系的内容和构建信息安全管理的方法和途径。
According to the design requirements of safety technology, the establishment of industrial control information security management platform.
按照等级保护安全技术设计要求,建立工业控制信息安全管理平台。
Information security management standards are guidelines for the organization and implementation of information security management systems.
信息安全管理标准是组织建立并实施信息安全管理体系的指导性准则。
It is expected that an information security management system implementation will be scaled in accordance with the needs of the organization.
按照组织的需要实施信息安全管理体系,是本标准所期望的。
ISO 27000 series of standards is general and universal international standards for information security management, suitable to all industries.
ISO 27000系列标准是通用的、普适性的信息安全管理国际标准,适用于所有行业。
The Scheme Choice Optimization Model was expounded based on coordinating agent to meet the need of dynamic network information security management.
根据网络动态信息安全管理的需求,提出了协调代理的方案选择优化数学模型。
Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.
风险评估必须用到评估工具来完成对信息保护的工作,从而建立信息安全的管理体系。
To build a good information security management programme, it's extremely important that you have the strategy, good security awareness contents and delivery plan.
要建立一项好的信息安全管理计划,您一定要拥有信息安全战略、优质的信息安全意识教育内容和培训交付计划。
This paper discussed the necessity to construct information security management system in Chinese traditional medicine hospital from the view of information security.
文章从信息安全的角度讨论了建立中医医院信息安全管理体系的必要性。
This will be its information security management needs analysis, security threats in a bid to build their management and security system to give a systematic exposition.
因此要构建一个完备的电子政务安全管理体系就必须对安全威胁有清楚的认识并加之行之有效的管理。
This article on RFID makes a preliminary study of information security management in sensitive fields like the military, national security department, as well as enterprise.
本文就RFID在一些敏感领域像军事、国家安全部门以及企业的信息安全管理中的应用做了初步探讨。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
The contents of product information security management are analyzed, and the paper builds product information model and product information assets model for security management.
从降低产品信息保密管理复杂度的角度,提出面向系统边界的产品信息保密控制方法。
This International Standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system.
本标准用于为建立、实施、保持和持续改进信息安全管理体系提供要求。
In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.
本文就信息安全威胁、信息安全技术和信息安全管理对校园网的信息安全进行探讨。
As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.
而风险评估作为信息安全管理的一个重要环节,对保障企事业的基础信息系统安全有着非常重要的作用。
It is the most important task of security construct to build E-government Information security guarantee system. Information security Management is one of key link in the guarantee system.
而信息安全管理是其中的关键环节之一,风险评估作为信息安全管理的重要内容,在信息安全管理体系建设的各个阶段发挥着重要的作用。
This paper presents a new information security management model based on an analysis of the existing information security management models and information security requirements of the organization.
在分析现有信息安全管理模型的基础上,根据组织机构的信息安全要求提出一个新的信息安全管理模型。
Before examining how to use the security features of RFIDIC, this article reviews some background information on RFID data management.
在研究如何使用RFIDIC的安全特性之前,本文先回顾rfid数据管理的一些背景信息。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Organize enterprise security management, it management, and risk management functions to promote efficient exchange of information and leverage corporate knowledge.
组织企业的安全管理,信息技术管理以及风险管理功能,以提高信息的有效交换及企业知识的提升。
While a company's brass must make information security a priority, security personnel also need to meet management half way by making their messages interesting and accessible, Amoroso says.
不仅公司的管理层要将信息安全视为头等要务,信息安全人员本身也要向管理层做出一些妥协,要尽量使自己传递的信息变得更加有趣易懂。
In its settlement with BJ's, the FTC used its broad "fairness authority" to penalise bad information-security management.
美国联邦贸易委员会在与BJ的和解中,使用了他宽泛的“公证权威”用来惩罚信息安全管理不当的公司。
Tivoli Security Policy Manager - Provides a uniform point of administration of users, federation of user information, and privilege management.
TivoliSecurityPolicyManager——提供针对用户、用户信息联合和特权管理的统一管理点。
Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more.
信息管理是一个庞大的主题,可涉及到有关内容管理策略、分布式访问、联合安全性等的讨论。
Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more.
信息管理是一个庞大的主题,可涉及到有关内容管理策略、分布式访问、联合安全性等的讨论。
应用推荐