In the medical field, to solve the problem of network security threats while reducing the risk of information security is a very challenging thing.
在医疗领域,解决网络安全威胁的同时还要减少信息安全风险是一件非常具有挑战性的事情。
Most of the compliance requirements (but not all) involve information security and the associated business risk.
大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。
Sources of risk to information security include, but are not limited to, people or hardware within or outside the organization (Figure 2).
信息安全风险的来源包括(但并不限于)机构内部或者外部的人或硬件(图2)。
Where applicable, the seller must provide, at the buyer's request, risk and expense, any information in the possession of the seller that is required for the security clearance of the goods.
应买方要求并由其承担风险和费用,在需要办理清关手续时,卖方必须提供由其占有的对办理货物安全许可必需的信息。
Information security risk in the context of corporate governance.
公司管理环境下的信息安全风险。
To ensure information security, it is necessary to improve the awareness of prevention, to take appropriate measures to plug the loopholes in time, to resolve the risk of leakage invisible.
要确保信息安全,就要提高防范意识,采取针对性措施及时堵塞漏洞,把泄密风险化解于无形之中。
Computerization of accounting information system brings many benefits for organizations. It can also bring the relevant risk to its security and reliability.
会计信息系统电算化为单位带来效益的同时,也带来了与信息系统的安全性、可靠性相关的风险。
The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.
正在考虑创建一所新的大学校园,你们的任务是对这所大学的信息技术(IT)安全性的风险评估建立模型。
Segment information helps improve the predictive ability of information users, and has decision availability in security pricing and risk assessment.
分部信息有助于改善信息使用者的预测能力,并在证券评价、风险评估方面具有决策有用性。
This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.
本文论述了信息系统的表现形态和系统结构,并分析了信息系统面临的安全风险。
Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.
传统信息系统安全风险评估从系统运行维护环境出发,分析其漏洞和威胁。
At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.
首先从信息安全风险评估的流程入手,着重叙述了信息安全风险评估过程中风险计算的原理和步骤。
As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.
而风险评估作为信息安全管理的一个重要环节,对保障企事业的基础信息系统安全有着非常重要的作用。
So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.
因此,本文主要分为两个重要的组成部分:信息系统的风险分析和管理过程及基于RBAC的安全模型设计。
To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.
为了保障移动通信信息系统的安全,制定有效的、操作性的、学的安全风险评估体系是当务之急。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
In this paper, based on the study and analysis of the information security risk assessment's concept, it explained the method and technique about target system.
简要介绍了风险评估指标体系,分析了体系中的指标特征,提出了风险评估的指标采集技术与评估方法。
Directly connection system of enterprise financial system and network banks is a modern application pattern, and the network information security risk is a key problem.
本文以一个银企直联系统为实例,从企业财务系统和网上银行系统两方面分析其系统结构,考察了系统信息安全需求。
In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.
第三部分,论文着重研究了一种基于资产、威胁和弱点的信息安全风险评估量化模型。
This paper describes the Security Risk Assessment of information.
本文针对信息安全风险评估进行阐述。
The proposed model USES the real value to measure the loss of security risk, and the result can be used in the information security risk investments decision directly.
模型采用实际资产损失值表示信息安全风险值,依据模型所计算的信息安全风险损失值可直接作为企业决策者关于信息安全风险投资决策的依据。
BP neural network, the method is nonlinear method, is applied to risk assessment model of information security. The subjectivity and man-made is overcome. It's an effective method.
建立的信息安全风险评估体系采用BP神经网络方法,是一种非线性方法,不带有明显的主观成分和人为因素,使评价结果更有效、更客观。
Therefore, evaluating risk effectively, selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system.
对信息系统进行有效的风险评估,选择有效的防范措施,主动防御信息威胁是解决信息系统安全问题的关键所在。
The article deals with the current analysis and risk evaluation of CISC (Chongqing Iron and Steel Company)'s information internet security under the opening systematic co-action secure structure.
本文论述了开放系统互联安全体系 结构下的重钢信息网络安全现状分析和风险评估;
According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.
通过对调研所得数据进行收集、归纳、比较和分析,本文提出了基于ISO 27000的针对复合图书馆信息安全的风险评估实施模型。
This paper firstly provides the concept of the information security risk assessment.
信息安全风险评估是考察信息系统安全性的一个重要环节。
This paper firstly provides the concept of the information security risk assessment.
信息安全风险评估是考察信息系统安全性的一个重要环节。
应用推荐