security risk assessment 中文意思是什麼

security risk assessment 解釋
安全風險評估
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • risk : n 1 風險,危險;冒險。2 【保險】(損失的)風險(率);保險金額;被保險人,被保險物。vt 冒…的危險...
  • assessment : n. 1. (價格的)評定,(稅額的)估定,(損害額的)查定。2. 稅額,攤派額。3. 【商業】應繳股款。4. (功過的)評價。
  1. The traditional assessment mainly relies on experience and judge by hand, and lack risk analytical method. in this way, the assessment is subjective and random. adopting the advanced risk management method can heighten the level of security client ' s management

    傳統的評估手段主要依賴經驗判斷和手工操作,缺乏現金的風險分析方法和風險量化手段,主觀隨意性強,勞動強度大,採用先進的風險評估技術可以在很大程度上提高證券類客戶管理的水平,風險價值法就是一種比較先進的評估技術。
  2. Secondly, based on risk assessment theory, it will mainly analyze a new transient security index and give out detailed assessment progress. the index consist transient insecurity probability and outcome to obtain balance between technology and economy

    該指標綜合了暫態失穩發生概率和後果兩方面,以獲得技術和經濟間的平衡,從而能保證最有效利用輸電線路乃至網路。
  3. For the very importance of the selection of the evaluation indexes, the writer adequately improves the correspending indexes such as the rate of return of the funds, the fiducial rate of market return, the rate of return without risk and the systematical risk index according to the the actual situation in the security market in china. on the strength of which, the synthetical appraisal method combining the simple factor method and the factorization method is adopted to give a further assessment for the achievement of the funds in china

    有鑒於此,針對我國證券市場和利率市場的實際情況,作者在本文中對證券投資收益率、市場基準收益率、無風險收益率及系統風險值等指標進行了充分的改進,並採用單因素評價法與因子分析法相結合的綜合評價法對我國基金的業績進行評估分析,研究結果表明:我國大部分的基金能戰勝市場,這說明我國的投資基金具有較好的業績表現。
  4. As one important portion of it, risk assessment provides the goal and require for the continual improvement of dynamic information system security management model

    風險評估作為其中的一個重要環節,為信息系統安全管理動態模型的持續改進提供了目標和要求。
  5. Through the example confirms that the website risk assessment method proposed by this article can reflect the website actual risk, it has the certain reference value regarding the website security construction

    通過實例證實該方法能夠反映網站實際存在的可能風險及其相對危害程度,對于網站安全建設具有一定參考價值。
  6. The method of information security risk assessment using bayesian networks

    基於貝葉斯網路的信息安全風險評估方法
  7. Design of security risk assessment tools for information system security based on web

    的信息系統安全風險評估工具的設計
  8. This document acts as a supplementary document to it security guidelines to give an introduction to a generic reference model for it security risk assessment and security audit

    這是《資訊科技保安指引》的補充文件,概述適用於保安風險評估及審計的參考模型。
  9. This paper focus on the application of the information security management standard - bs7799 to information security risk assessment and a whole set of designing scheme is provided, which is finally implemented in software form

    本文重點研究如何將信息安全管理標準bs7799應用到信息安全風險評估中,提供了整套的設計方案,並最終用軟體實現。
  10. With the development of internet, the issue of website security becomes more and more serious and comes to social attention. the website security risk assessment is important in the course of website security construction

    隨著internet的發展,網站安全問題日益嚴重,引起了全社會的廣泛關注,而網站安全風險評估則在網站安全建設過程中具有重要的地位。
  11. The achievements and new ideas in this paper are as follows : significance of research and development of the assessment tools of information security risk is analyzed, the relation between information security and information security risk assessment is discussed, the familiar risk assessment standards and risk assessment tools are introduced

    成果及新見解如下:分析了信息安全風險評估工具的研究和開發意義,討論了信息安全與信息安全風險評估的關系,介紹了常見的風險評估標準和當前常見的風險評估工具。
  12. This thesis based on the task study deals with design and realization of cc criteria security risk assessment system first presents the concepts and statuses of information security and risk assessment. it then expounds risk assessment ' s two main parts, criteria and process & methods. and it discusses deeply in the theory research results of the task prophase include cc criteria and cc evaluation process & methods, especially in cc ' s main idea, the applications of cc, work of the three phases in cc evaluation process and the applications of the cem documents together with cc in evaluation phase used in this security risk assessment system

    本文以基於cc標準的風險評估系統的設計和開發課題為背景,首先對信息安全及風險評估的相關概念及現狀做了介紹,其次詳細的闡述了風險評估概念及兩個重要組成? ?標準體系以及評估的過程和方法,然後總結了評估系統在設計時所涉及到的課題前期理論研究成果包括cc評估標準以及cc評估過程和方法等內容,特別是對cc標準的核心思想、 cc標準的具體應用、 cc評估過程三個階段的工作以及cc標準的伴隨文檔cem作為評估方法依據在執行評估階段的具體應用等方面做了深入研究和詳細論述,並指出這些理論依據當前存在的不足,本文最後以前面的理論研究成果為依據,闡述了cc評估系統的組成部分以及總體的設計方案,並對已完成的實現部分做了介紹。
  13. This thesis is based on the author ' s work in the network - rebuilding project of the comprehensive business system ( cbs ) of the agricultural development bank of china ( adbc ). considering the already - running network conditions, and based on the security risk analyses and assessment, referring to the dynamic information security model, it frames out the sound network security policy for the cbs as well as the hierarchy security system according to the policy. with the in - phase built - in deployment of the network - rebuilding project for the cbs, the network security system has got good practical results

    本文以作者在農發行綜合業務系統網路建設中的具體工作為背景,根據信息系統安全體系結構的一般性原則,對農發行綜合業務系統網路的安全風險進行了分析和評估,提出了構建安全平臺的需求和綜合業務系統的網路安全策略,建立了層次化的網路安全體系,設計了具體的技術方案和項目集成方案,該網路安全平臺已伴隨著綜合業務系統網路改造項目的實施而同步進行嵌入式構建。
  14. Risk assessment acts as the basis and premise in information security. together with information security, risk assessment becomes the focus and one of the task studies in this security area

    風險評估作為信息安全這項工程的基礎和前提,隨信息安全一併逐漸成為人們所關注的焦點和研究的課題。
  15. Analysis on risk assessment in security work

    試析警衛危險評估工作
  16. The hkma expects such independent assessments to be carried out by trusted independent experts before launch of the services, and thereafter at least once a year, or whenever there are substantial changes to the risk assessment of the services or major security breaches

    金管局要求認可機構于推出服務前先由可信賴的獨立專家進行這類評估,其後最少每年再進行一次,或當有關服務的風險評估出現重大改變或保安系統不能防禦入侵時再作評估。
  17. The indexing set for the assessment was established according to the relationship between the log files and human psychological security feature. also, an assessment method based on fuzzy ahp ( analytic hierarchy process ) was presented in consideration of the uncertainty and fuzzy quality of the human risk degrees measurement

    通過研究系統數據文件與人員心理安全特性的映射關系,提取測評人員風險度的指標體系結構,而後基於模糊層次分析方法提出了一種新的信息系統人員風險度測評方法,並實例驗證了方法的有效性。
  18. On the basis of comparing cc with other risk assessment criteria, we find cc may be tailored according to the concrete system and it fits website risk assessment. thirdly, this thesis analyze the security requirement of website according to web server protection profile based on cc. fourthly, through consulting related risk assessment standard and model and web server protection profile of cc, this thesis brings forward website risk assessment model, confirms the recognition method and assessment method of the property, threat and vulnerability of website information issue system, and establishes relevant evaluation guideline and half - quantitative risk computational method and formulates the risk rank determination criterion

    本文首先介紹了網站安全的定義、目標和國內外風險評估的研究現狀;然後對信息安全風險評估的基本概念和理論進行了闡述,同時簡要介紹了國際風險評估標準的發展現狀,並詳細闡述了通用準則cc ( commoncriteria ) ,在將cc和其他風險評估標準進行比較分析的基礎上,發現cc標準可以根據具體的系統作定製開發,比較適合網站風險評估;接下來,本文結合cc標準下制定的webserverprotectionprofile ,分析了web網站的安全需求;隨后,本文通過借鑒相關的風險評估標準和模型,以及cc的webserverprotectionprofile ,提出網站風險評估模型,確定網站的資產、威脅和脆弱性的識別方法和評價準則,並構造出半定量的風險分析方法,最終制定風險等級判定準則;最後,通過一個實例來驗證本文所提出的基於模型的半定量風險分析方法的實用性。
分享友人