物理安全 的英文怎麼說
中文拼音 [wùlǐānquán]
物理安全
英文
physical security- 物 : 名詞1 (東西) thing; matter; object 2 (指自己以外的人或與己相對的環境) other people; the outsi...
- 理 : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 物理 : 1. (事物的內在規律) innate laws of things2. (物理學) physics
-
The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。Application of radiation monitors to the control and physical security of special nuclear material
特種核材料的控制和物理安全用輻射監控器的應用Discussion on the physical safety of the data inside computer
淺議計算機數據的物理安全It is organized into ten major sections ; one of these sections is for physical security
主要包括10個部分,其中有一個部分講述的就是物理安全問題。Physical security is concerned with protecting hardware from possible human and natural disasters
物理安全涉及到保護硬體免遭可能發生的人為或自然災難的破壞。How much physical security you need on your system is very dependent on your situation, and / or budget
有多少您需要考慮的物理安全問題與您的職位和/或預算有關Biotechnology - laboratories for research, development and analysis - containment levels of microbiology laboratories, areas of risk, localities and physical safety requirements
生物技術.研究開發和分析實驗室.微生物實驗室的抑制等級,風險區,選點,物理安全要求This course is intended to provide some specifics concepts such as the methodology of hacking, incident handling, encryption, physical security, database security, e - commerce security
這個課程的目標是為學員提供一些深入的概念:如黑客攻擊手段、安全事件的處理響應、加密技術、物理安全、數據庫安全、電子商務安全等。There are corresponding security limitations in physical security layer network security layer server security layer application security layer application designing elements security layer, and ensure absolute security of the whole system
從物理安全層、網路安全層、服務器安全層、應用程序安全層、應用程序設計元素安全層都有相應的安全限制,保證了系統的絕對安全。Aiming at this problem, the paper expatiates the security policy of the mobile ip technology from four aspects including physical security policy, authentication of the mobile terminal, multilateral - authentication on entities of the mobile ip system and encryption of user data
接下來,論文第一次系統的從物理安全策略、移動終端身份安全、移動ip各實體間的多層認證、用戶數據傳輸安全四個角度論述了移動ip技術的安全策略。In order to implement security target, this article gives a design on security system of the special inforn1ation system in our departn1ent based on the security policy, and discusses the system security solution in lbur sides that is physical security
然後,制定了安全策略、安全機制以及安全功能要求,並為實現安全目標進行了基於安全策略的安全體系設計,最後,從物理安全、網路安全、應用系統安全、管理安全等四個方面論述了系統安全的解決方案。Physical security basics
物理安全性基礎知識Enhance physical security
增強物理安全性To enhance the physical security of the sql server installation, do the following tasks
若要增強sql server安裝的物理安全性,請執行以下任務:Constraints on resources, such as : hardware, personnel, space for storing backup media, the physical security of the stored media, and so on
對資源的約束,例如硬體、人員、存儲備份媒體的空間以及存儲媒體的物理安全性等。Nonetheless, if the physical security of the authentication device is an issue, what happens if a digital representation of someone s fingerprint is stolen
但是,如果認證設備的物理安全性有問題,那麼當某人指紋的數字表示被盜,會怎樣呢?Topics include installation, physical security, creating security policies, backups, authentication, firewalls, intrusion detection, and network security
其主題包括:安裝、物理安全性、創建安全策略、備份、認證、防火墻、入侵偵測和網路安全性。" security, " however, is often used as a catch - all phrase that includes several individual components : physical security, authentication, and authorization
然而, 「安全性」通常在所有的階段都需要使用,它包括幾個單獨的組件:物理安全性、身份驗證和授權。The security of network systems includes physical security, network security, application security and the security management system. the design and implementation of network systems security deals with these problems
網路系統安全包括系統物理安全性、網路安全性和應用安全性以及安全管理體系,網路系統安全的設計與實現就是要研究這個問題。In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed
本文對全國住房公積金監督管理信息系統網路安全體系進行設計,包括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與訪問控制和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。分享友人