operating security 中文意思是什麼

operating security 解釋
操作安全性
  • operating : adj 1 運行的;操作的;工作的。2 關于業務的;營業上的;關于收支的。operating expenses 業務開支;營...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured

    操作系統是唯一緊靠硬體的基本軟體,其安全職能是其他軟體安全職能的根基,缺乏這個安全的根基,構築在其上的應用系統以及安全系統,如pki 、加密解密技術的安全性是得不到根本保障的。
  2. Operating system security conspectus

    操作系統安全三
  3. W factere w the work of strengthen the security of the enterprise information mp to be the highest priority, the whcle enthely analyses all ldnds of security problems tha a intemal netwrk of stock compan may risk thtough rystematic view. it gives out sollltions fbr the crst systffo wt on wtg, operating systeln, taling system, tu1ti - vinrs, beckalp, secwity edce and physical settings

    在此基礎上,對公司現有系統作出了系統化的安全方案,包括應用防火墻技術、 vlav技術和windows2000 )系統的安全機製作出的網路和系統平臺,防病毒和系統備份方案,根據公司中心機房建設的規模,以及中心機房所在地的現場條件,分別就空調系統、后備電源系統、防雷擊和系統監控給出實施方案。
  4. Debian gnu linux is the first choice as base operating system for innominate when developing standard and customized security appliances for a long time

    數年來, innominate在開發標準及特殊訂做的網路安全產品時, debian gnu linux一直是他們基礎操作系統的第一選擇。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. Besides, to enforce the security of authentication process, in this thesis we propose the design and implementation of a passwd checker and mandatary identification and authentication mechanism in ercist 4. 0 secure operating system

    本文還介紹了安勝4 . 0安全操作系統中口令檢查器和強身份認證機制的設計和實現,以增強鑒別過程的安全性。
  7. The main way rogue programs get into a system is by exploiting security holes in the operating system

    惡意的程序進入系統的主要方法是利用操作系統的安全性漏洞。
  8. Security guards, operating inside bullet-proof glass cubicles, and speaking through microphones, scrutinized every arrival and departure.

    警衛們在裝有防彈玻璃的小室里值勤,通過麥克風細致盤問每一個進出的人。
  9. The security mechanism of network database is related with many aspects. though the analysis of architecture and software arrangement, i divide this problem into four layers : network security mechanism, dbms security mechanism, operating system ( server ) security mechanism and application system security mechanism

    從體系結構和軟體層次上思考,筆者將其分為網路安全機制、服務器操作系統安全機制、數據庫管理系統安全機制和應用系統安全機制四層。在這個層次結構中,每一層都有自己的一套機制,完成自己的任務,實現一定的安全內容。
  10. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  11. In the light of the main factors influencing the safe broadcasting of digital audio workstation system, this paper advances some measures from aspects of dual server ' s fault - tolerant technology, raids, security of operating system and database, security of exchanger, and calibrating technique for time, etc

    針對影響數字音頻工作站系統安全播出的主要因素,從服務器雙機容錯技術、冗餘磁盤陣列、操作系統及數據庫安全性、交換機的安全性、時間的校準技術等方面提出了措施。
  12. On the basis of the annual appraisal, incentives were implemented for poorest performers under the integrated assessment in the form of full - time training for redeployment, posting adjustment for junior cadres with poorest performance, etc., as a mechanism to foster a sense of commitment and dedication among police officers ; pertinent remedial initiatives were launched to thoroughly curb the extortion of confession through torture, abuse of police arms weapons and unscrupulous resort to coercive measures. this year, based on the " five prohibitions " by the public security department, a new " public security director s order " has again been issued to strictly prevent police officers from involvement in operating places of entertainment, protecting related illegal activities, and collecting undue fees or fines

    近5年來,四川省公安廳根據本地實際,以連續頒發"公安廳長令"的形式就公務用槍、警車警燈警報使用、加強扣押和暫扣機動車管理的問題做出了明確規定;建立了在年終考核基礎上,對綜合考評處于末位的民警實行待崗培訓、基層幹部末位調整等鼓勵民警愛業敬業,忠於職守的激勵機制;還深入開展了嚴禁刑訊逼供、嚴禁濫用槍支警械和嚴禁濫用強制措施的專項治理;今年又在執行公安部" 5條禁令"的基礎上,再次頒發"公安廳長令" ,嚴禁公安民警參與經營娛樂服務場所及其違法活動提供保護和嚴禁亂收費、亂罰款。
  13. Jeffrey bedser, chief operating officer of icg inc., a security company, said his firm has had clients that " have had consultants and contractors, including janitors, all the way up to senior executives stealing the data, trading the data or selling the data.

    經營電腦安全業務公司icg inc .的首席運營官jeffrey bedser稱,公司真有這樣的客戶,上至企業高管人員下至看門守衛都在設法從公司數據庫找到數據與他人交換,或出售給第三方。
  14. Nowadays, network security problems getting worse and worse, the demand for secure operating system is in impendence

    在網路安全問題日益嚴重的今天,對安全操作系統的需求非常迫切。
  15. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  16. The chip and its operating system have attained the highest standard, itsec e6, by the information technology security evaluation and certification scheme in europe

    晶片和有關的操作系統已獲歐洲資訊科技保安評估及認證計劃評定為達到資訊科技保安及評估及認證最高的標準-第六級。
  17. The chip and its operating system have attained the highest standard, itsec e6, by the information technology security evaluation and certification scheme in europe. the panel of judges commented that smartics was comprehensive and included more than 20 innovative security features

    晶片和有關的操作系統已獲歐洲資訊科技保安評估及認證計劃評定為達到資訊科技保安及評估及認證最高的標準-第六級。
  18. The importance of network security is introduced. by analysing traditional measurements taken on network security, we find out that the last network security gate should be established on operating system level. a mac mechanism on socket layer is implemented in the paper

    3 ) 、研究了傳統的文件保護措施,結合嵌入式文件系統的特點,提出了一種基於文件描述符的文件安全機制,從文件操作api級實現了對文件的保護。
  19. K40 seal - making machines employ imported parts, interating the techuolgy of light machine electricity and designs. it incorporates outlooks furctions precision perfectly. the windows operatrg system in chinese is used, supporting printing scanning machines ttf characters of internationd standard and bmp jpg flies. the seals made can reach the norms specitied in the public security industry norms of the prc ga241 - 2000. with a simple operating system and standardized characters. it can be used easily and the characters of various types can swith easily, meeting the multi - level demands of various customers. it is an ided equipment to help a chieve your aims in investment

    儀,兼容ttf國際標準字體枯寂bmp jpg等文件,同時期刻制的印章效果完全能達到中華人民共和國公共安全待業標準ga241 . - 2000 。操作簡單,字體規范,好學易用,正字反字陰陽字隨意轉換,多種型號產品滿足了不同層次客戶的需求,是投資興業的理想設備。
  20. The hydraulic pneumatic operation system and dual crown block saver which are equipped completely can alleviate worker ' s labour intensity and raise operating security

    配備完整的液壓氣動操作系統和雙重防碰天車,減輕工人的勞動強度,提高了操作安全性。
分享友人