It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
This model USES Encryption Support Layer, security Protection and Reliability Support Layer to guarantee the system security and stability in different aspects.
模型采用密码支撑层、安全防护与可靠性支持层保证系统不同层面的安全性与可靠性。
All security features needed to provide an acceptable level of protection for hardware, software, and classified, sensitive, unclassified or critical data, material, or processes in the system.
用于对系统中硬件、软件、机密、敏感、不机密,或关键性的数据,材料或过程提供可接受的水平的保护的所有安全特性。
After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.
信息系统第三方测试完成后,业务单位应完成信息系统安全等级保护备案和测评整改工作。
Twenty-sixth Information System Security Grading Protection filing and evaluation rectification.
第二十六条信息系统安全等级保护定级备案和测评整改。
The security model of the proxy server based on PDRR consists of protection system, detection system, response system, recovery system and expert system.
基于防御-检测-响应-恢复的代理服务器安全模型由防御、检测系统、响应系统、恢复系统和专家系统组成。
With function of protection ring and security kernel, a novel model for enhancing security of operating system is proposed.
利用保护环和安全内核的功能,提出了一种新的增强操作系统安全性的模型。
The invasion detection system is one kind of initiative protection network resources network security system, in recent years, we obtained extensive research and the application.
入侵检测系统是一种主动保护网络资源的网络安全系统,近年来得到了广泛的研究与应用。
The speed, sensitivity and reliability of transformer protection improve with the higher requirement of the power system security.
随着电网对安全性要求的提高,对电力变压器保护的速动性、灵敏性、可靠性要求也越来越高。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.
有些文献将这些保护数据、阻挡非法数据访问的技术统称为计算机安全或系统安全技术。
Based on analyzing various security threats faced by the wireless network, this paper discusses on the principles and methods for constructing the wireless network security protection system.
在分析无线网络所面临的各种安全威胁的基础上,讨论了构建无线网络安全防护体系的原则和方法。
The machine is equipped with control panel box , security protection system and powerful suction motor fan.
我们为客户配置电电控箱、相关的安全保护器和大功率、高性能的排风机。
The system of warranty to the defects of title has been playing a unique value and role in the maintenance of the security for trade and protection of the interests of consumers.
权利瑕疵担保责任制度作为一项古老的制度,在维护交易安全和保护消费者利益方面一直发挥着独特的价值和作用。
These mechanisms can provide dual fine grain protection and enhance the system scalability and security.
本系统能提供细粒度的安全保护,提高了系统的可扩展性和安全性。
The relay protection system is an important part of power network, and has a very close relation with the security and stabilization of the power network.
继电保护系统是电网的重要组成部分,与电网的安全稳定运行有着十分密切的关系。
Because in the protection transaction security, the real right behavior non-the natural principle and the good intentions obtain the system to become one which of focal points the scholars disputed.
在保护交易安全上,物权行为的无因性原则与善意取得制度已成为学者们争议的焦点之一。
It is applied in relay protection, system metering and analysis of power system. It has a close relation with the security and reliability of power system.
它被广泛应用于继电保护、系统监测、电力系统分析之中,关系到电力系统的安全性与可靠性。
This paper discusses the security strategy, system protection, intrusion detection, emergency responding system and backup, disaster restore strategy essential for network security protection.
文章介绍了进行网络安全防范所必需的安全策略、系统防护、入侵检测、应急响应体系及备份、灾难恢复策略。
More detailed analyses are given in these aspects: the campus network plan, topology, the function of the business application system, and security protection and management.
提出了新校园网建设的需求,从校园网的网络规划、拓扑结构、业务应用系统功能、安全保障和安全管理等方面进行了详细分析;
Security measures are provided for personnel, user accounts, system policies, data protection, and virus prevention.
对人员、用户帐号、系统策略、数据保护、病毒防治制定了详细的安全措施。
Expert system, protection system and detection system respectively confirms security level and strategy in alternation, and detects new attack event.
专家系统、防御系统和检测系统交互分别确定安全级别和安全策略,并检测新的攻击。
Overview of operating system 2. Process management 3. Memory Management 4. Storage management 5. Distributed systems 6. Protection and Security.
作业系统概述2。行程管理3。记忆体管理4。储存体管理5。保护和保密6。分散式系统。
To study the protection technology and predict and analyze the behaviors of an operating system is the important content of the security of the operating system.
研究操作系统的安全防护技术,预测分析操作系统的安全行为,是操作系统安全的重要内容。
The central part of intelligent security protection system is signal collecting and processing, among which the intrusion detector is a key part.
智能化安全防范系统的核心是信息采集与处理,其中入侵探测器是进行信息采集的关键部件。
Intelligent network forensic system (INFS) gives us a new method of network protection, and remedies the shortage of the current network security system.
智能网络取证为网络防护提供了一种新的措施,弥补了原有网络安全体系中的不足。
Second, we should speed up our efforts to build a better social security system to provide basic support to workers and give better protection to disadvantaged groups.
为广大劳动者提供基本保障,更加关注对弱势群体的保护。
To make full use of the WAMS/PMU in the security monitoring, protection and control of power system, PDSR in phase angle-voltage space was studied.
为充分发挥含PMU的广域量测系统(W AM S/PMU)在电力系统安全预警、保护与控制中的作用,研究了节点相角-电压空间上保证暂态稳定的动态安全域的边界性质。
The design principle, system design and security strategy of integrative information security and protection architecture are discussed.
以及一体化信息安全防护体系的设计原则、系数设计、管理上的安全策略。
应用推荐