Most of the compliance requirements (but not all) involve information security and the associated business risk.
大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。
Organize enterprise security management, it management, and risk management functions to promote efficient exchange of information and leverage corporate knowledge.
组织企业的安全管理,信息技术管理以及风险管理功能,以提高信息的有效交换及企业知识的提升。
Better security and lower risk by enabling an organization to identify and authenticate a user once, and then use that identity information across multiple systems, including external partners.
支持组织识别和验证用户一次,然后跨多个系统(包括外部合作伙伴)使用那个身份信息,从而提高安全性并降低风险。
Where applicable, the seller must provide, at the buyer's request, risk and expense, any information in the possession of the seller that is required for the security clearance of the goods.
应买方要求并由其承担风险和费用,在需要办理清关手续时,卖方必须提供由其占有的对办理货物安全许可必需的信息。
DaimlerChrysler is not in any way responsible for the information contained on those sites or their security and you use these links at your own risk.
戴姆勒—克莱斯勒股份公司对这些网站所包含的信息或其安全性在任何方面均不承担责任,您使用这些链接时须风险自负。
This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.
本文论述了信息系统的表现形态和系统结构,并分析了信息系统面临的安全风险。
Computerization of accounting information system brings many benefits for organizations. It can also bring the relevant risk to its security and reliability.
会计信息系统电算化为单位带来效益的同时,也带来了与信息系统的安全性、可靠性相关的风险。
As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.
而风险评估作为信息安全管理的一个重要环节,对保障企事业的基础信息系统安全有着非常重要的作用。
Segment information helps improve the predictive ability of information users, and has decision availability in security pricing and risk assessment.
分部信息有助于改善信息使用者的预测能力,并在证券评价、风险评估方面具有决策有用性。
To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.
为了保障移动通信信息系统的安全,制定有效的、操作性的、学的安全风险评估体系是当务之急。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.
第三部分,论文着重研究了一种基于资产、威胁和弱点的信息安全风险评估量化模型。
Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.
风险评估必须用到评估工具来完成对信息保护的工作,从而建立信息安全的管理体系。
The risk not only include information security risk, but also more importance include competitive risk, transition risk, customer-induced risk and business partner risk.
这风险不仅指安全风险,更危险且难以辨认的风险是竞争风险、变革风险、消费者风险和经营伙伴风险。
So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.
因此,本文主要分为两个重要的组成部分:信息系统的风险分析和管理过程及基于RBAC的安全模型设计。
Caveat: Also, using this option poses a security risk because error messages will disclose path and database information to malicious visitors who attempt rogue behaviors on your store.
警告:此外,使用此选项会带来安全风险,因为错误的信息会给那些试图恶意破坏你商店的访问者透露相关路径和数据库中的信息。
BP neural network, the method is nonlinear method, is applied to risk assessment model of information security. The subjectivity and man-made is overcome. It's an effective method.
建立的信息安全风险评估体系采用BP神经网络方法,是一种非线性方法,不带有明显的主观成分和人为因素,使评价结果更有效、更客观。
At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.
首先从信息安全风险评估的流程入手,着重叙述了信息安全风险评估过程中风险计算的原理和步骤。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.
通过对调研所得数据进行收集、归纳、比较和分析,本文提出了基于ISO 27000的针对复合图书馆信息安全的风险评估实施模型。
The proposed model USES the real value to measure the loss of security risk, and the result can be used in the information security risk investments decision directly.
模型采用实际资产损失值表示信息安全风险值,依据模型所计算的信息安全风险损失值可直接作为企业决策者关于信息安全风险投资决策的依据。
The article deals with the current analysis and risk evaluation of CISC (Chongqing Iron and Steel Company)'s information internet security under the opening systematic co-action secure structure.
本文论述了开放系统互联安全体系 结构下的重钢信息网络安全现状分析和风险评估;
The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded.
对信息安全风险评估和系统风险的整体评价进行了理论归纳。
The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.
阐述了信息安全风险评估所要解决的问题,介绍了目前在信息安全风险评估领域的主要方法,并对这些方法进行了分析和评价。
For the conventional security risk assessment, the results by large granularity assessment can't provide security administrators with much effective and applicable information.
传统的风险评估中,大粒度的评估结果不能给安全管理员提供切实有用的信息。
Therefore, evaluating risk effectively, selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system.
对信息系统进行有效的风险评估,选择有效的防范措施,主动防御信息威胁是解决信息系统安全问题的关键所在。
Therefore, evaluating risk effectively, selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system.
对信息系统进行有效的风险评估,选择有效的防范措施,主动防御信息威胁是解决信息系统安全问题的关键所在。
应用推荐