security configuration 中文意思是什麼

security configuration 解釋
安全配置
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • configuration : n. 1. 結構;構造;圓形,外形。2. 組合,布置;配置。3. 地形;【天文學】(行星等的)相對位置,方位;【化學】(分子中原子的)組態,排列;【物理學】位形;組態。
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. You as the authorized administrator need the configuration client to define a security policy and define network objects and log on to the firewall

    ) ,用戶作為授權管理員,需要配置客戶來定義安全策略(和定義網路對象以及登錄防火墻) 。
  3. Ntfs helps provide file protection based on users and groups, and only allows users with administrative privileges for a particular level to edit security configuration files

    Ntfs幫助提供基於用戶和組的文件保護,並且只允許具有特定級別的管理特權的用戶來編輯安全配置文件。
  4. Windows server 2003 sp1 enhances security infrastructure by providing new security tools such as security configuration wizard, which helps secure your server for role - based operations, improves defense - in - depth with data execution protection, and provides a safe and secure first - boot scenario with post - setup security update wizard

    Windows server 2003 sp1通過提供諸如安全配置向導之類的新安全工具增強了安全基礎結構,它有助於確保服務器的基於角色的操作的安全、通過數據執行保護提高縱深防禦能力並通過后安裝安全更新向導提供安全可靠的第一次引導方案。
  5. Used by the gac cache lock files and the security configuration caching mechanism of the common language runtime

    由gac緩存鎖文件和公共語言運行庫的安全配置緩存機制使用。
  6. The microsoft baseline security analyzer mbsa is a tool that enables an individual home user, a corporate user, or an administrator to scan one or more windows - based computers for common security configuration mistakes

    Microsoft baseline security analyzer ( mbsa ) (基準安全分析器)是一個供個人家庭用戶、企業用戶或管理員使用的工具,它能夠在一個或多個基於windows的計算機上掃描常見的安全配置錯誤。
  7. Class, enabling the com security configuration

    類的新實例,啟用com +安全配置。
  8. Provides the location of the security configuration files

    提供安全配置文件的位置。
  9. For more information about security configuration, see

    有關安全配置的詳細信息,請參閱
  10. Manually editing the security configuration files

    手動編輯安全配置文件
  11. To view the current. net framework security configuration

    查看當前的. net framework安全配置
  12. Property indicating whether to enable com security configuration

    屬性以指示是否啟用com安全配置。
  13. Property to indicate whether to enable com security configuration

    屬性以指示是否啟用com +安全配置。
  14. The following table shows the locations of the security configuration files

    下表顯示安全配置文件的位置。
  15. Must be followed by the path to the user security configuration file

    之後必須是指向用戶安全配置文件的路徑。
  16. Security configuration and privilege mapping using grid map file

    安全配置,以及使用網格映射文件進行權限映射。
  17. From the point of view of the xmlhttprequest object, the interaction occurs within the existing security configuration

    從xmlhttprequest對象的角度來看,這種交互發生在現有的安全配置之內。
  18. For the first example, let s consider a security configuration file to detail different security domains within a configuration file

    作為第一個例子,我們來考慮一個安全配置文件,它在一個配置文件中詳細描述不同的安全領域。
  19. Security configuration process

    安全性配置過程
  20. How to prove the safety and the reliability of the information system, how to decide the proper security configuration has become the key problem for the information security researchers and users

    隨著信息安全研究的深入,如何證明信息系統可以信賴,如何判定系統的安全設置是否適當,已成為系統使用者所關注的重要問題。
分享友人