• Most of the compliance requirements (but not all) involve information security and the associated business risk.

    大多数遵从性需求不是全部都涉及信息安全性相关业务风险

    youdao

  • Organize enterprise security management, it management, and risk management functions to promote efficient exchange of information and leverage corporate knowledge.

    组织企业安全管理信息技术管理以及风险管理功能提高信息的有效交换企业知识的提升。

    youdao

  • Better security and lower risk by enabling an organization to identify and authenticate a user once, and then use that identity information across multiple systems, including external partners.

    支持组织识别验证用户一次然后多个系统(包括外部合作伙伴)使用那个身份信息,从而提高安全性降低风险

    youdao

  • Where applicable, the seller must provide, at the buyer's request, risk and expense, any information in the possession of the seller that is required for the security clearance of the goods.

    买方要求并由其承担风险费用需要办理关手续时,卖方必须提供占有对办理货物安全许可必需的信息

    youdao

  • DaimlerChrysler is not in any way responsible for the information contained on those sites or their security and you use these links at your own risk.

    戴姆勒—克莱斯勒股份公司这些网站包含信息安全性任何方面承担责任使用这些链接时须风险自负。

    youdao

  • This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.

    本文论述了信息系统表现形态系统结构分析了信息系统面临安全风险

    youdao

  • Computerization of accounting information system brings many benefits for organizations. It can also bring the relevant risk to its security and reliability.

    会计信息系统电算化单位带来效益的同时,带来与信息系统的安全性可靠性相关风险

    youdao

  • As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.

    风险评估作为信息安全管理重要环节,对保障企事业的基础信息系统安全有着非常重要作用

    youdao

  • Segment information helps improve the predictive ability of information users, and has decision availability in security pricing and risk assessment.

    分部信息有助于改善信息使用者预测能力证券评价风险评估方面具有决策有用性

    youdao

  • To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.

    为了保障移动通信信息系统安全制定有效的操作性的、的安全风险评估体系当务之急。

    youdao

  • This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.

    本文提出一种基于信息系统安全性分析来定量计算信息安全风险度量尺度差距分析方法相应评估流程

    youdao

  • Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.

    负责公司的信息系统安全评估控制风险制定安全政策、制定灾难恢复计划确保政策与计划执行。

    youdao

  • In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.

    第三部分论文着重研究了一种基于资产威胁弱点信息安全风险评估量化模型

    youdao

  • Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.

    风险评估必须用到评估工具完成对信息保护的工作,从而建立信息安全管理体系。

    youdao

  • The risk not only include information security risk, but also more importance include competitive risk, transition risk, customer-induced risk and business partner risk.

    风险不仅安全风险,危险且难以辨认的风险是竞争风险、变革风险、消费者风险经营伙伴风险。

    youdao

  • So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.

    因此本文主要分为两个重要组成部分信息系统风险分析管理过程基于RBAC安全模型设计

    youdao

  • Caveat: Also, using this option poses a security risk because error messages will disclose path and database information to malicious visitors who attempt rogue behaviors on your store.

    警告此外使用选项带来安全风险因为错误信息那些试图恶意破坏商店访问者透露相关路径数据库中的信息

    youdao

  • BP neural network, the method is nonlinear method, is applied to risk assessment model of information security. The subjectivity and man-made is overcome. It's an effective method.

    建立信息安全风险评估体系采用BP神经网络方法是一非线性方法,不带有明显的主观成分人为因素,使评价结果更有效、更客观。

    youdao

  • At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.

    首先信息安全风险评估流程入手着重叙述信息安全风险评估过程风险计算原理步骤

    youdao

  • Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    youdao

  • According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.

    通过调研所得数据进行收集归纳比较分析,本文提出了基于ISO 27000针对复合图书馆信息安全风险评估实施模型

    youdao

  • The proposed model USES the real value to measure the loss of security risk, and the result can be used in the information security risk investments decision directly.

    模型采用实际资产损失表示信息安全风险值,依据模型所计算信息安全风险损失值直接作为企业决策者关于信息安全风险投资决策的依据。

    youdao

  • The article deals with the current analysis and risk evaluation of CISC (Chongqing Iron and Steel Company)'s information internet security under the opening systematic co-action secure structure.

    本文论述开放系统互联安全体系 结构重钢信息网络安全现状分析风险评估

    youdao

  • The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded.

    信息安全风险评估系统风险的整体评价进行了理论归纳。

    youdao

  • The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.

    阐述信息安全风险评估所要解决的问题介绍了目前信息安全风险评估领域主要方法这些方法进行了分析和评价

    youdao

  • For the conventional security risk assessment, the results by large granularity assessment can't provide security administrators with much effective and applicable information.

    传统风险评估中,粒度评估结果不能安全管理员提供切实有用的信息。

    youdao

  • Therefore, evaluating risk effectively, selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system.

    信息系统进行有效风险评估,选择有效防范措施主动防御信息威胁解决信息系统安全问题关键所在

    youdao

  • Therefore, evaluating risk effectively, selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system.

    信息系统进行有效风险评估,选择有效防范措施主动防御信息威胁解决信息系统安全问题关键所在

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定