• In the medical field, to solve the problem of network security threats while reducing the risk of information security is a very challenging thing.

    医疗领域解决网络安全威胁同时还要减少信息安全风险一件非常具有挑战性的事情

    youdao

  • Most of the compliance requirements (but not all) involve information security and the associated business risk.

    大多数遵从性需求不是全部都涉及信息安全性相关业务风险

    youdao

  • Sources of risk to information security include, but are not limited to, people or hardware within or outside the organization (Figure 2).

    信息安全风险来源包括并不限于机构内部或者外部硬件2)。

    youdao

  • Where applicable, the seller must provide, at the buyer's request, risk and expense, any information in the possession of the seller that is required for the security clearance of the goods.

    买方要求并由其承担风险费用需要办理关手续时,卖方必须提供占有对办理货物安全许可必需的信息

    youdao

  • Information security risk in the context of corporate governance.

    公司管理环境下信息安全风险

    youdao

  • To ensure information security, it is necessary to improve the awareness of prevention, to take appropriate measures to plug the loopholes in time, to resolve the risk of leakage invisible.

    确保信息安全就要提高防范意识采取针对性措施及时堵塞漏洞,把泄密风险化解无形之中

    youdao

  • Computerization of accounting information system brings many benefits for organizations. It can also bring the relevant risk to its security and reliability.

    会计信息系统电算化单位带来效益的同时,带来与信息系统的安全性可靠性相关风险

    youdao

  • The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.

    正在考虑创建一所新的大学校园你们任务大学信息技术(IT)安全性风险评估建立模型

    youdao

  • Segment information helps improve the predictive ability of information users, and has decision availability in security pricing and risk assessment.

    分部信息有助于改善信息使用者预测能力证券评价风险评估方面具有决策有用性

    youdao

  • This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.

    本文论述了信息系统表现形态系统结构分析了信息系统面临安全风险

    youdao

  • Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    youdao

  • At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.

    首先信息安全风险评估流程入手着重叙述信息安全风险评估过程风险计算原理步骤

    youdao

  • As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.

    风险评估作为信息安全管理重要环节,对保障企事业的基础信息系统安全有着非常重要作用

    youdao

  • So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.

    因此本文主要分为两个重要组成部分信息系统风险分析管理过程基于RBAC安全模型设计

    youdao

  • To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.

    为了保障移动通信信息系统安全制定有效的操作性的、的安全风险评估体系当务之急。

    youdao

  • Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.

    负责公司的信息系统安全评估控制风险制定安全政策、制定灾难恢复计划确保政策与计划执行。

    youdao

  • Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.

    信息安全风险评估信息系统安全工程重要组成部分,也是建立信息安全保障体系的基础

    youdao

  • In this paper, based on the study and analysis of the information security risk assessment's concept, it explained the method and technique about target system.

    简要介绍风险评估指标体系分析了体系中的指标特征,提出了风险评估指标采集技术评估方法

    youdao

  • Directly connection system of enterprise financial system and network banks is a modern application pattern, and the network information security risk is a key problem.

    本文以一个银企系统实例,从企业财务系统网上银行系统两方面分析其系统结构,考察了系统信息安全需求。

    youdao

  • In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.

    第三部分论文着重研究了一种基于资产威胁弱点信息安全风险评估量化模型

    youdao

  • This paper describes the Security Risk Assessment of information.

    本文针对信息安全风险评估进行阐述

    youdao

  • The proposed model USES the real value to measure the loss of security risk, and the result can be used in the information security risk investments decision directly.

    模型采用实际资产损失表示信息安全风险值,依据模型所计算信息安全风险损失值直接作为企业决策者关于信息安全风险投资决策的依据。

    youdao

  • BP neural network, the method is nonlinear method, is applied to risk assessment model of information security. The subjectivity and man-made is overcome. It's an effective method.

    建立信息安全风险评估体系采用BP神经网络方法是一非线性方法,不带有明显的主观成分人为因素,使评价结果更有效、更客观。

    youdao

  • Therefore, evaluating risk effectively, selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system.

    信息系统进行有效风险评估,选择有效防范措施主动防御信息威胁解决信息系统安全问题关键所在

    youdao

  • The article deals with the current analysis and risk evaluation of CISC (Chongqing Iron and Steel Company)'s information internet security under the opening systematic co-action secure structure.

    本文论述开放系统互联安全体系 结构重钢信息网络安全现状分析风险评估

    youdao

  • According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.

    通过调研所得数据进行收集归纳比较分析,本文提出了基于ISO 27000针对复合图书馆信息安全风险评估实施模型

    youdao

  • This paper firstly provides the concept of the information security risk assessment.

    信息安全风险评估考察信息系统安全性一个重要环节。

    youdao

  • This paper firstly provides the concept of the information security risk assessment.

    信息安全风险评估考察信息系统安全性一个重要环节。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定