隱私權報告 的英文怎麼說

中文拼音 [yǐnquánbàogào]
隱私權報告 英文
privacy reporting
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ動詞1 (告知; 報告) report; declare; announce 2 (回答) reply; respond; reciprocate 3 (答謝)...
  • : 告動詞(由上至下告知) officially announce
  • 隱私權 : poorly
  • 隱私 : 1. (隱蔽不外露) conceal; hide2. (秘密事) secret; one's secrets; private matters one wants to hide
  • 報告 : 1. (告訴) report; make known; inform 2. (講演; 書面申請或總結) report; speech; talk; lecture; advisory
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. By the research, it is put forward that our country at present stage should firstly modify the present law and rules to make preparation for making credit data known to the public, secondly should work out the regularized new law to use credit data as quick as possible, during modifying and working out the law, should pay attention to the scope to open regularized credit data to guarantee the fair and just of the credit investigation report of credit managing trade, and pay much attention to protecting personal right of privacy, meanwhile, should establish the punish system to those of breaking their promise

    通過研究提出,我國現階段應首先修改現行的法律法規為徵信數據公開做準備,其次應盡快出臺關於征信數據使用規范的新法案;在修改和制訂法律的過程中要注意規范信用數據公開的范圍、保證信用管理行業的資信調查的公平與公正性並注重保護個人的;同時應建立對失信者的懲罰機制。
分享友人