information security policy 中文意思是什麼

information security policy 解釋
信息安全政策
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • policy : n 1 政策,政綱;方針,方向;方法。2 策略;權謀;智慧;精明的行為。3 【軍事】政治,行政。4 〈蘇格...
  1. With the rapid development of the security stock market especially the stock market in chian , issuing stock and circulating on market became the first choice of financing for more and more enterprise at the same time , more and more investors are attracted by the relately high initial return of stock however , the problem of ipos underpricing always exists in the stock market according to the data of more than one thousand chinese stocks , most new issues had great raise in the first trade day , and investors could acquire higher initial return than the average return of the stock market or the same industry we find that initial returns on a - share ipos average reached 132. 24 percent the main body of this paper is made up of six sections : in the first part , we introduced the method of the estimate of pricing decision ; in the second part , we analyzed the method of the pricing decision and issuing system in china , discussed the advantage and weakness of the various issuing methods , and compared the economic efficiency between the examine and approve system and authorization system ; in the third part , we analyzed the reason of ipo ' s underpricing in detail from information economics and other factors and combined with the environment of the chinese stock markets , we analyzed the special characteristics in china and how they effect the ipo ' s underpricing in the fourth part , we analyzed the data of chinese stock market with spss , made a analysis of the administrative pricing decision and market pricing decision , studied the underpricing phenomena of chinese stock market , and analyzed it ' s causes ; in the fifth part , we made a analysis of the examine approve system and authorization system ; and in the last part , we drew some conclusions and put forth some policy advices the follow are the conclusions and policy advices in this dissertation : ( 1 ) from the results of this empirical study , we found that the issuing price - earning ratio and the market situation before ipos are strongly and positively associated with the underpricing of shares , the issuing scale of ipo and the hit rate are strongly and negatively associated with the underpricing ; ( 2 ) we found that after the abolishing of ipo ' s p / e ratio and the using of authorization system , there is no significant difference among the underpricing of shares , but considered with the market entironment , we think that the ipo ' s underpricing has been correspondingly reduced ( 3 ) to reduce difference between the primary market and the second market , we suggested that we shall bring the " over - allotment option ( oao ) " to bear and resume the state - owned share and corporate - owned share to circulate on market as soon possible

    本文的主體由六個部分組成:第一部分介紹新股發行定價的估值方法;第二部分對我國的發行定價方式和發行制度進行分析,探討不同發行定價方式的優缺點,以及審批制和核準制經濟效率分析;第三部分從信息經濟學角度和其他因素的角度詳細分析造成新股發行抑價的原因,並結合我國股票市場實際情況,分析了我國市場的特有因素是否及如何影響一級市場的發行抑價程度的;第四部分利用統計分析軟體spss對我國新股行政化和市場化定價進行實證分析,主要包括新股發行行政化和市場化定價方式的實施情況和效果分析、新股發行行政化定價方式的實證分析,以及新股發行行政化和市場化定價方式的比較實證分析;第五部分利用統計分析軟體spss對我國新股發行審批制和核準制進行實證分析;第六部分是本論文的主要結論。本文的主要結論和建議有: ( 1 )從實證分析結果看,我國新股發行抑價與市場環境、發行市盈率呈顯著正向關系,與發行規模、申購中簽率等呈顯著反向關系。 ( 2 )取消發行市盈率限制和實施核準制等市場化改革措施並沒有降低發行抑價的絕對水平,只是由於市場環境的因素,發行抑價的相對水平才有所降低。
  2. According to the books - seller s security policy, the payment information will only be revealed to the accounts department

    依據圖書銷售商的安全性策略,支付信息只能讓會計部門知道。
  3. Privacy and information security policy statement

    南投縣政府文化局隱私權及資訊安全政策
  4. The current policy directions for the second i & c security action plan started in 2005 comprise the following four major goals : " establishment of the national i & c security crisis and incident reporting and alarm mechanism & risk management system ", " consolidation of national i & c security awareness and the promotion of information security educational training ", " standardization and certification services ", and " promotion of international cooperation to attack cyber crimes, " with the hope to " ensure that taiwan has a safe and reliable i & c environment, " through the implementation of i & c security operations

    2005年開始的第二期資通安全機制計劃,目前規劃的政策方向,主要有建立國家資通安全事件通報及危機應變體系、強化國家資通安全認知與推廣資安教育訓練、標?規范與認驗證服務、以及促進國際合作工同打擊網路犯罪等四項,期望藉由資通訊安全作業的落實,確保我國擁有安全、可信賴的資訊通訊環境。
  5. According to hiberarchy security model of information system, osgw system is partitioned into four layers, forcibly implemented with hardware - based security and protects data through internet ; 2, to recieve and forward the oracle data packets, we put forward a promethean method of service renaming which makes it possible to enhance the oracle ' s security ; 3, after finishing the analysis of security demand, the gateway implements seveval kinds of security policy model and this make the gateway may be applied in sorts of condin ' on ; 4, the syntax of subject and object label is flexible and helps to scheme these labels, which is pioneer in correlative fields ; 5jby blacklist the osgw filtrates some loggin request based on accounts, host and applications. the blacklist subsystem strengthens the availability and performance of the gateway system

    黑名單系統在中間層實現了基於客戶身份,客戶主機和客戶應用程序的安全過濾,增強了系統的可用性和性能。本文的主要工作包括設計並實現osgw安全系統和osgw安全信關兩個部分。 osgw安全系統關注的是從物理層,軟體層和inetert層實現oracle系統的安全性; osgw安全信關本質上是osgw安全系統的軟體層, osgw安全系統的b級安全特性由osgw安全信關來實現。
  6. This information can help you profile system activity and track possible security policy violations

    這些信息可以幫助您了解系統活動並跟蹤可能的安全策略沖突。
  7. The information security administration code of internet service business site - part 12 : code of audit policy

    網際網路上網服務營業場所信息安全管理代碼.第12部分:審計規則代碼
  8. Office of the government chief information officer - it security policy and guidelines

    政府資訊科技總監辦公室-資訊科技保安政策及指引
  9. Based on the above three - view framework, the thesis proposes a generic security architecture model for distributed information systems. this model is comprised of three parts as follows : the security service view model quality of security service ( qoss ) refers to the ability of a security system to satisfy the security service requirements of users. based on qoss, a security service view model is presented here, which includes variant security, strength of mechanism level ( sml ), adaptive security policy and so on

    在三視圖框架的基礎上,本文進一步提出了一個通用的分散式信息系統安全體系結構模型,該模型主要分為以下三個部分:安全服務視圖模型本文提出了一個基於安全服務質量( qoss )的安全服務視圖模型,它包括可變安全、安全機制的強度級別( sml )和自適應的安全策略等方面的內容。
  10. This thesis is based on the author ' s work in the network - rebuilding project of the comprehensive business system ( cbs ) of the agricultural development bank of china ( adbc ). considering the already - running network conditions, and based on the security risk analyses and assessment, referring to the dynamic information security model, it frames out the sound network security policy for the cbs as well as the hierarchy security system according to the policy. with the in - phase built - in deployment of the network - rebuilding project for the cbs, the network security system has got good practical results

    本文以作者在農發行綜合業務系統網路建設中的具體工作為背景,根據信息系統安全體系結構的一般性原則,對農發行綜合業務系統網路的安全風險進行了分析和評估,提出了構建安全平臺的需求和綜合業務系統的網路安全策略,建立了層次化的網路安全體系,設計了具體的技術方案和項目集成方案,該網路安全平臺已伴隨著綜合業務系統網路改造項目的實施而同步進行嵌入式構建。
  11. The methods for the deployment of web applications both in client and server side are highlighted. security in a networked information system is a very complex task that ranges fonn the level of crypto - primitives over crypto - protocols to the level of organizational matters and legislation. according to the information security requirement and security policy of a cooperative environment, an information security model is shown and three key security mechanisms are discussed in the following part

    因此本文首先根據基於web的協同產品開發的特點,綜合運用計算機支持的協同工作和分散式對象技術的理論,提出了基於web的協同產品開發環境的體系結構,為全文的論述奠定了基礎基於web的協同產品開發中信息安全研究應從系統設計的高度,全面地考慮系統的安全模型、安全需求和安全策略,合理的信息安全模型是保證產品開發過程安全、可靠、可控的前提。
  12. To prevent this from happening, implementing a set of information security policy is essential

    為防止這些情況發生,公司必須實施一套資料保安政策。
  13. So that you can use the services and facilities provided on this website with more peace of mind, we have provided our bureau websites information security policy below

    為了讓您能夠更安心的使用本局網站所提供的各項服務措施,特此向您說明本局網站資訊安全政策如下:
  14. Based on comprehensive information security policy of security system, this paper studies the security of local area network by network security technology and network security management

    摘要基於安全系統的全面信息安全策略,從網路安全技術和網路安全管理這兩個層次上研究內部網的安全性。
  15. Application policy of digital information security technology

    數據信息安全技術的應用策略
  16. Last but not least, the text puts forward three pieces of policy advice, that is, to establish and perfect the macro management system, law protection system and policy support system of our country ' s network information security insurance

    最後,文章提出了建立健全我國網路信息安全保險宏觀管理體系、法律保護體系、政策扶持體系三項政策性建議。
  17. The major recommendations of the working group include enhancing enterprise awareness of business benefits, capabilities ( including the security aspects ) and service offerings of wireless solutions ; encouraging continuous development of information security technologies solutions, generic products based on open standards, and seamless end - to - end chinese language - supported it systems with wireless extensions ; continuing to promote wider use of wireless services within the government, a key it user, in line with established e - government policy ; and fostering closer co - operation between various ict sectors

    工作小組的主要建議包括:加強企業用戶對無線技術的好處、能力(包括保安能力) 、和產品種類的認識;鼓勵持續發展資訊保安技術方案、採用開放標準的通用產品、和支援中文並具備無線功能的資訊科技系統;繼續按既定的電子政府政策,推動作為主要資訊科技使用者的政府更廣泛採用無線服務;以及促進各資訊及通訊科技界別的更緊密合作。
  18. In view of the highly distributed and opening characteristics of information systems in network times today, this chapter employs a method of security domains separation to study the security of systems of various kinds of degree of complexity the key for information system security is that the system security policies must be complete, correct and consistent, and be enforced properly so the security policy is also discussed in detail in this chapter, from policy correctness, fullness, consistency, granularity, to policy variety

    注意到當今網路時代信息系統的高度分佈和開放的復雜特點,本章採用安全域劃分的方法,研究了各種四川大學博士學位論文復雜程度的系統的安全性。系統安全的關鍵是安全政策必須完備、正確且一致,並得到正確實施。因此,本章詳細討論了系統安全政策,從政策的正確性、完備性、一致性、粒度、到多樣性,並且給出了一種政策的一致性檢查演算法。
  19. During the year, the office embarked on an information technology security study. the study aims to review the existing security policy of the information systems and to conduct detailed risk assessments

    在本年報的報告期內,本處展開了有關資訊科技保安的研究,旨在檢討現有的資訊科技系統保安政策,並對整體網路資訊系統進行詳盡的風險評估。
  20. For more information about default security policy, see

    有關默認安全策略的更多信息,請參見
分享友人