The article depicts in detail about the content of the information security management system and its establishing methods approaches.
比较详细地介绍信息安全管理体系的内容和构建信息安全管理的方法和途径。
It is expected that an information security management system implementation will be scaled in accordance with the needs of the organization.
按照组织的需要实施信息安全管理体系,是本标准所期望的。
Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.
风险评估必须用到评估工具来完成对信息保护的工作,从而建立信息安全的管理体系。
This paper discussed the necessity to construct information security management system in Chinese traditional medicine hospital from the view of information security.
文章从信息安全的角度讨论了建立中医医院信息安全管理体系的必要性。
This International Standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system.
本标准用于为建立、实施、保持和持续改进信息安全管理体系提供要求。
The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.
美国国土安全部需要了解商用电子绩效管理系统的实用性,用于其人力资源管理。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.
通过研究,本文对陕鼓信息系统安全管理有指导作用,对制造型企业信息系统安全管理有借鉴作用。
To ensure systems security must think over network, operating system, application and operation demand etc in the synthetical information management systems of electric power corporations.
在电力企业的综合信息管理系统中,必须从网络、操作系统、应用程序和业务需求等各方面来保证系统的安全。
However, for any information system, robust and effective security management mechanism is the fundamental guarantee to the legally use of information.
然而对于任何一个信息系统,健壮有效的安全管理机制是合法使用信息的基本保障。
The management of the user usually relates to the data security problem of the managing information system.
用户管理往往涉及到一个信息管理系统的数据安全问题。
The paper particularly and thoroughly studied the structure design and the performance optimizing and the security management of the database on a certain military information system.
本文对某军用信息系统数据库的基本结构设计、数据库系统性能优化、数据库安全管理进行了深入细致的研究。
The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.
本文从管理、流程、技术、教育、审计等方面出发,通过对多项措施的有机结合,为企业打造一个良好的信息安全体系。
Conclusion Intranet security management system can effectively guarantee information security of hospital Intranet and greatly improve work efficiency of network maintenance personnel.
结论内网安全管理系统能够有效的保障医院内网信息安全和大幅提高网络维护人员的工作效率。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.
企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制和管理控制。
NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.
NET构建了学校信息管理系统,本文介绍了系统的整体设计,数据库访问方法和数据安全防范措施。
The security of ERP information management system was considered firstly when the small and medium enterprises implemented ERP system.
ERP信息管理系统软件的安全性是中小型企业在实施ERP系统时必须考虑的问题。
In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.
并从管理、技术角度出发,提出了相应的解决方案,以消除医院信息系统的安全隐患。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Management of user authority is an important component of welding application software. It's concerned with the security of system information, the user's operation and the authority, etc.
用户权限管理是焊接应用软件的重要组成部分之一,关系到系统信息安全、用户对软件操作和使用权限等重要问题,是焊接应用软件是否实用的重要标志。
The system can process the security and navigation information aptitudinally, which make it suitable for the modern shipping management requirement much more.
由于智能化处理安全信息、导航信息,使之更符合现代船舶管理系统的要求。
It is the most important task of security construct to build E-government Information security guarantee system. Information security Management is one of key link in the guarantee system.
而信息安全管理是其中的关键环节之一,风险评估作为信息安全管理的重要内容,在信息安全管理体系建设的各个阶段发挥着重要的作用。
The Information system Security management does not involve only the management system or only the relevant techniques, but includes the relevant strategies, management and techniques.
信息安全管理不单单是管理体制或技术问题,而是策略、管理和技术的有机结合。
The first chapter emphasizes on the importance of information system security. It introduces modern security management theories and the BS7799 security management standard.
第一章重点阐述信息安全管理的重要性,介绍现代安全管理思想,引入国外的BS 7799安全管理标准。
However, since no system can ever be 100 percent secure, a prevention-only approach to information security management is not enough.
然而,从来没有一些系统能保证100%的安全,仅仅阻止接近信息安全系统也是不够的。
To ensure systems security must think over network, operating system, application and operation demand etc in the synthetically information management systems of electric power corporations.
在电力企业的综合信息管理系统中,必须从网络、操作系统、应用程序和业务需求等各方面来保证系统的安全。
The factory did not regularly hold meetings that are attended by senior management to address information technology issues, including system security.
工厂没有定期举行高级管理人员参加的会议,以解决信息技术问题,包括系统的安全性。
The company regularly holds meetings that are attended by senior management to address information technology issues, including system security.
该公司定期举办高级管理人员参加的会议,以解决信息技术问题,包括系统的安全性。
So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.
因此,本文主要分为两个重要的组成部分:信息系统的风险分析和管理过程及基于RBAC的安全模型设计。
应用推荐