national security information 中文意思是什麼

national security information 解釋
國家安全資料
  • national : adj 1 民族的;國民的;國家的;國民特有的。2 國家主義的;愛國的。3 國立的 國有的 國定的;全國性的...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有高度脆弱性和風險性、潛伏性和突發性、攻擊源的多樣性和防範對象的不確定性、安全主體的不對稱性等特徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科技、資源生態等領域。威脅信息安全的因素主要包括病毒、網路黑客、網路犯罪和垃圾信息等。
  2. In the meantime, foster and others at the argonne national laboratory and the globus alliance continue to forge ahead with the creation of additional grid computing standards, particularly those involving information sharing and security - a particular hot button for many companies interested in grid computing but concerned about the loss of sensitive data

    同時, foster和在argonne national laboratory和globus alliance的其他人繼續制定附加的網格計算標準,特別是關于信息共享和安全的標準對于許多對網格計算感興趣,但又擔心丟失敏感數據的公司來說是特別好的標準。
  3. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  4. Koal software, which is approved by the state secrets bureau, is one of the first qualification corporations on computer information system integration related to national secrets. koal software, a pilot unit of computer network security services authentication by the computer network and information security administrtion office, has an experienced team for information system integrated security construction and services management and implementation. to users, it is a reliable long - time system security provider

    格爾軟體是國家保密局批準的首批「涉及國家秘密的計算機信息系統集成」資質單位,是國信安辦認定的首批計算機網路安全服務試點單位,擁有一支經驗豐富的信息系統整體安全建設與安全服務的項目管理與實施隊伍,是用戶信息系統能夠得到長久安全保障的可信賴的信息安全服務商。
  5. The most confidential information refers to vital state secrets, the divulgence of which will cause extremely serious harm to state security and national interests ; classified information refers to important state secrets, the divulgence of which will cause serious harm to state security and national interests ; and confidential information refers to ordinary state secrets, the divulgence of which will cause harm to state security and national interests

    絕密」是最重要的國家秘密,泄露會使國家的安全和利益遭受特別嚴重的損害; 「機密」是重要的國家秘密,泄露會使國家的安全和利益遭受嚴重的損害; 「秘密」是一般的國家秘密,泄露會使國家的安全和利益遭受損害。
  6. Shanghai software companies in china and thailand established in the south to develop marketing centres, network security technology and services support to the south advance, the center has become specialized in the shanghai pudong software park information network security, information security is the outcome of the national industrialization base ( eastern ) first be settled down enterprises

    公司在上海成立中軟華泰南方研發銷售中心,將網路安全的技術和服務支持向南方推進,中心成為上海浦東軟體園專門從事信息網路安全的機構,是國家信息安全成果產業化基地(東部)的首批入駐企業。
  7. The requirement for disk array is coming larger and larger with the development of information popularization in various fields, especially in high - tech industries, financial reorganization and national security department, where the reliable and highly secure disk storage system are required

    大規模的信息存儲技術方興未艾,隨著我國個行業信息話的發展對磁盤陣列的要求會越來越大,特別是高科技產業,金融機構和國家安全部門需要高可靠性和高安全性的磁盤存儲系統。
  8. On the basis of studying the theory of mrp ii, jit and the analysis of state and requirement of the production planning management in machine and dynamicale filiale of china national south aeroengine & machnery company, this article presents a production planning management mode which suits ( he state of the factory, and researches the architecture, function model, information model of the production planning management system running on client / server network. and accomplishes the production planning management system of electric lamp - house equipment which is a mrp application system and meets the requirement of our plant. using the system we can manage production plans and get the information of material short in time. a right management module is given to achieve system security satisfactorily

    本文在研究mrp 、 jit理論和分析南方公司機動分公司生產計劃管理現狀和需求的基礎上,提出了一種適合於廠情的生產計劃管理模式,研究了在客戶服務器網路環境下生產計劃系統的體系結構、功能模型、信息模型;通過採用可視化、面向對象的快速開發工具成功地開發了適合於本公司實際需要的mrp應用系統? ?電光源設備生產計劃管理系統,實現了計算機輔助生產計劃管理、缺件情況定時預報等功能;通過用戶權限管理,較好地解決了系統的安全性問題。
  9. Crosslink magazine provides technical information from the aerospace corporation, a federally funded r d center focusing on national security space

    -包括業界新聞,提供中國航天航天工業管理軍民兩用航天知識產權世界航空航天博覽月刊。
  10. The current policy directions for the second i & c security action plan started in 2005 comprise the following four major goals : " establishment of the national i & c security crisis and incident reporting and alarm mechanism & risk management system ", " consolidation of national i & c security awareness and the promotion of information security educational training ", " standardization and certification services ", and " promotion of international cooperation to attack cyber crimes, " with the hope to " ensure that taiwan has a safe and reliable i & c environment, " through the implementation of i & c security operations

    2005年開始的第二期資通安全機制計劃,目前規劃的政策方向,主要有建立國家資通安全事件通報及危機應變體系、強化國家資通安全認知與推廣資安教育訓練、標?規范與認驗證服務、以及促進國際合作工同打擊網路犯罪等四項,期望藉由資通訊安全作業的落實,確保我國擁有安全、可信賴的資訊通訊環境。
  11. Moreover, in integrating the resources from different related departments and associations, the national information and communication security taskforce ( nicst ) has played a major role in launching the national i & c security infrastructure

    於此同時國家資通安全會報的成立,在整合有關部會資源,積極推動我國資通安全基礎建設上,扮演了相當重要的角色。
  12. Traditional security view cannot explain why the human - being is still facing various threats, so, the research on national security is not simply restricted to the fields of military, politics and diplomacy affairs, the non - traditional security issues such as economy, environment, information, transnational crime, drug trade, terrorism, smuggle, spreadi ng illness, which are connected with national security has become the hot spot, under this background, this thesis chooses the non - traditional security as the object to discuss so as to state the main issues of non - traditional security existing in china

    於是,國家安全的研究不再僅僅局限在軍事、政治和外交領域,與國家安全密切相關的經濟安全、生態環境安全、信息安全、恐怖主義、走私販毒、疾病蔓延等「非傳統安全」問題成為國內外學者研究的熱點問題,相關領域的學者們對此展開了熱烈的討論。正是在這種背景下,本文選擇了關于非傳統安全問題作為探討方向,目的是想通過在前輩研究成果的基礎上,對新世紀中國存在的主要非傳統安全問題進行全面的論述,進而尋找應對非傳統安全問題的思路與策略,為我國的國家安全戰略服務。
  13. Relied on the project “ management system of the hydro engineering construction trade of tianjin ” ( msect ) of hcht, this thesis analyzes the national situation of engineering construction trade and the domestic and international network trade at present, expatiates the knowledge of engineering construction trade, discusses the tender review methods which are often used and sets the mathematic models for methods of tender review which are being studied, designs the structure models and application development in detail, at last describes the technologies being used in network security, information security and impartial supervision

    本文依託北京海策環通科技發展有限責任公司承接的「天津市水利工程建設交易管理系統」開發項目,對國內工程建設交易的現狀和國際國內網上交易的情況進行了分析,對工程建設交易理論知識進行了全面闡述,對常用評標方法進行了對比研究,對在研評標方法進行了數學模型方面的探討,對系統的架構模型和應用開發進行了詳細設計和研究,最後對網路安全、信息安全和公正監督等採用的技術進行了重點闡述。
  14. China national information security testing evaluation and certification center

    中國國家信息安全測評認證中心
  15. Information interchange - representation of national security emergency preparedness - telecommunications service priority

    信息交換.國家安全應急準備表示.電信服務優先權
  16. At the same time, it must ensure that national security is not put at risk by the disclosure of highly sensitive intelligence information

    同時,我們亦必須確保國家安全不會因披露高度機密的情報資料而受到危害。
  17. U. s. safeguard system for national security information

    美國國家信息安全保障體系簡介
  18. Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "

    根據涉密信息網路對安全的特殊性,根據國家對涉密信息網路安全的相關規范,筆者對x所的信息網路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照信息系統安全工程的方法設計了針對該所整個信息網路系統物理安全、網路運行安全、信息安全保密以及安全保密管理等方面的解決方案,完成了網路安全域劃分、防電磁泄漏、安全審計、網路安全管理、信息傳輸加密和訪問控制等工作。
  19. Containing information, the unauthorized disclosure of which poses the gravest threat to national security

    絕密極其保密的信息,任何不經許可的揭密都會對國家安全造成最嚴重的危脅
  20. On national security strategy in the information age

    信息時代國家安全戰略論要
分享友人