security of information system 中文意思是什麼

security of information system 解釋
信息系統的安全性
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • of : OF =Old French 古法語。
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. The security management of information system is a dynamic circulatory evolutive process

    信息系統的安全管理工作是一個動態循環演化的過程。
  2. While the adoption of the b / s mode simplifies the developing of client software, however it raises the requirement for data security, and the function of complex windows for data exchanging is difficult to fulfill. on the basis of the comparison and discussion of the developing and running modes of all kinds of information system, this paper is devoted to the study of key techniques of information system in the research of " graduate education & management information system ( gemis ) ". on the basis of the comparing and analyzing of the modes of information system from the aspect of engineering practice, a novel c / s and b / s combined mode is presented

    本文在對目前各種信息系統開發運行模式比較和探討的基礎上,結合「研究生教育管理信息系統」課題的具體開發實踐,對信息系統的關鍵技術進行了深入的理論和實踐研究:從工程實踐的角度對信息系統多種開發運行模式進行分析和比較;提出了一種新型的c s 、 b s混合信息系統模式;對不同信息系統模式尤其是c s和b s混合模式下數據庫訪問方式進行闡述;對powerbuilder8 . 0的特點、 asp腳本語言的特點進行了介紹;研究了基於b s模式下利用asp腳本語言實現信息系統的數據庫發布技術;針對研究生教育管理工作的特點,結合信息系統開發的相關知識如數據庫設計、數據管道、數據庫並發控制、數據窗口設計、應用窗口設計等技術,實現了「研究生教育管理系統」 ,並得到了實際應用。
  3. In order to maintain the security of the system information, system security is also designed

    為了維護系統信息數據的安全性,對系統安全進行了設計。
  4. According to hiberarchy security model of information system, osgw system is partitioned into four layers, forcibly implemented with hardware - based security and protects data through internet ; 2, to recieve and forward the oracle data packets, we put forward a promethean method of service renaming which makes it possible to enhance the oracle ' s security ; 3, after finishing the analysis of security demand, the gateway implements seveval kinds of security policy model and this make the gateway may be applied in sorts of condin ' on ; 4, the syntax of subject and object label is flexible and helps to scheme these labels, which is pioneer in correlative fields ; 5jby blacklist the osgw filtrates some loggin request based on accounts, host and applications. the blacklist subsystem strengthens the availability and performance of the gateway system

    黑名單系統在中間層實現了基於客戶身份,客戶主機和客戶應用程序的安全過濾,增強了系統的可用性和性能。本文的主要工作包括設計並實現osgw安全系統和osgw安全信關兩個部分。 osgw安全系統關注的是從物理層,軟體層和inetert層實現oracle系統的安全性; osgw安全信關本質上是osgw安全系統的軟體層, osgw安全系統的b級安全特性由osgw安全信關來實現。
  5. This dissertation analyzed the risks of the current applications and characteristics of the e - government system of the state development planning commission ( sdpc ) and recommended the establishment of certificate center based on pki for sdpc e - government to address the security requirement of it, with the application of information system security and information security engineering theories

    本文以信息系統安全和信息安全工程理論為指導,根據國家計委電子政務應用需求現狀和特點進行風險分析,從而根據安全需求,提出建立基於pki的國家計委電子政務證書中心的要求。
  6. Secondly, the activex plug - in of arcims in the client server allows users instantly browse, query and download the information through internet by permission. to assure the security of information exchange between the national remote sensing center and the state council, the system has an additional subsystem, which can protect the intranet of the state council from internet

    4 、在論述災情發布系統體系之前,先對arcims和arcsde的系統結構進行了分析介紹,由於都是esri公司的產品,其體系結構上有著類似的特點:多層式結構,可以分為數據管理、服務器端、客戶端3個邏輯層面;都偏重於數據應用而非管理。
  7. Under finite precision, ways we always seek is easy to implement. and we encrypt the fh system with chaotic stream cipher. simulation results show that the security properties of fh sequence have been improved and the security of information is guaranteed even the fh patterns are broken

    大量的對比分析試驗表明,該密鑰生成器生成的混沌序列密碼的密碼學特性良好。同時,本文還努力的尋求一種在有限精度條件下混沌加密的可實現方案,並利用混沌序列密碼對跳頻系統進行加密。
  8. Koal software, supported by famous universities, colleges and scientific institutions, uniting well - known information security service providers, offers security integration, information system service, information security consultation and ca service. koal software establishes a credible, unitive and integral information security support system for e - government and e - commerce by introducing the concept and model of integrated security into informatization establishment

    格爾軟體依託著名高校和科研機構,聯合知名信息安全服務商,為廣大用戶提供以整體安全集成、信息安全服務、信息安全咨詢、數字證書認證服務等為內容的信息系統整體安全建設與服務,通過把整體安全的概念、模型引入到信息化的建設中去,為電子政務、電子商務建立一個可靠的、統一的、完整的信息安全保障體系。
  9. The economy of network expanding of 1000m network, high performance of information flux, security of information transmission is thinked about in the designing. standard of fast ethernet network technology is selected, standard of configuration laying line is used, vpn technology is adopt to realize security of network, it satisfy the need of present and future. designing a manage system information of some group of dalian air force missile, which can manage people, file and training in the real time and dynamic, realize management of science, veracity and speedy

    在設計中考慮了網路經濟性、平滑過度到千兆以太網的擴展性、減少了信息的流量高性能性,信息傳輸的可靠安全性,採用了快速以太網技術作為網路建設標準,採用結構化布線技術進行設備和信息點規劃,利用vpn技術進行安全保護,滿足了部隊現有的需要和擴展的要求初步設計了大連空軍導彈某團訓練信息管理系統,對部隊中的人員、文件及訓練情況進行實時、動態管理,達到了管理的科學性、準確性、迅速性,使軍隊管理成為一個有序的實體。
  10. Firstly, it introduces the information security theories and technologies used in the study. the information security theories mainly includes ppdr - the dynamic security model, sse - cmm, padminee - the life cycle of information security engineering model, bs7799 - the standard of information security management, the grade - classification standard of information system security protection, iatf - the technical framework of information security guarantee and the principle of wooden pail etc. and the information security technologies consist of the technology of firewall, invasion detection, virus prevention and cure, loophole scanning, the identity certification and the soc etc. then it studies on the designing of the information security guarantee system

    首先,介紹和分析與本研究相關的主要信息安全理論與技術,其中信息安全理論有ppdr動態安全模型、 sse - cmm系統安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理標準、信息系統安全保護等級劃分準則、 iatf信息安全保障技術框架和木桶安全理論等;信息安全技術有防火墻技術、入侵檢測技術、計算機病毒防治技術、漏洞掃描與評估技術、身份認證技術和soc技術等。
  11. The whole system adopts b / s mode of three - layer structure, and the education administration subsystem has been implemented by using modularized programming idea and asp technology and sql server 7. 0. some validating mechanism and safe information transmission method have been used to improve the security of the system

    本文採用三層結構的b / s模式,運用模塊化的編程思想,使用asp技術和sqlserver7 . 0來實現教學管理系統,並使用一定的驗證機制和安全的信息傳輸方式來提高該系統的安全性。
  12. The thesis analyzes concerned hidden trouble of network security, common used method of network attack, the system structure of information system, hierarchy of network security, security evaluation rule of information system, and analyzes the problem of e - business which shall be solved

    本文分析了網路本身存在的安全隱患,常見的網路攻擊方法,信息系統的安全體系結構,網路安全的層次模型,信息系統的安全評估準則,在此基礎上分析了電子商務要解決的難題。
  13. Concept model and evaluation model of information system security risk

    信息系統安全風險的概念模型和評估模型
  14. An risk - analysis - centric model of information system security engineering

    以風險分析為中心的信息系統安全工程模型
  15. According to the security demand of national information system of electronic government affairs, based on a wide - ranging investigation and survey on the structure, the manufacturing process and the security status of the communication business network of zhejiang province. the author used the theoretic knowledge of the security of information system and the engineering method. and then i analyzed the systemic security risk and security needs of the communication business network of zhejiang from the physics layer, network layer, system layer, application layer and administration layer respectively

    論文作者參照國家對電子政務信息系統的安全要求,在對浙江省交通業務網的網路、業務流程和安全現狀進行了廣泛的調查了解的基礎上,運用信息系統安全的理論知識和工程方法,分別從物理層、網路層、系統層、應用層及管理層上對浙江省交通業務網系統進行了安全風險和安全需求分析,在此基礎上研究了安全技術和安全服務的配置原則和方法,設計出浙江省交通業務網的總體安全方案。
  16. Access control is a very important aspect in security of information system

    訪問控制是信息系統安全的重要方面。
  17. And in order to describe the security of information system more accurately, the author gives a set of related guidelines

    為了更加準確的描述信息系統的狀態,作者提出了一套相關的評價指標。
  18. A lot of work has been done towards the higher security of information system, and many mature information system prototypes have been developed

    長期以來,人們針對信息系統的安全問題作了大量研究,已經有許多成熟的信息系統安全模型。
  19. The research in the paper has definite theoretic and practical value in the field of security of information system. it is a useful reference for designing the security of e - mail system

    本文的研究工作在電子政務及其他信息系統的安全領域具有一定的理論和實用價值,可為郵件系統的安全設計提供參考。
  20. The research in the paper has definite theoretic and practical value in the field of security of information system. it is a useful reference for designing the security of information system

    本文的研究工作在電子政務及其他信息系統的安全領域具有一定的理論和實用價值,可為信息系統的安全設計提供參考。
分享友人