防信息泄漏 的英文怎麼說

中文拼音 [fángxìnxièlóu]
防信息泄漏 英文
tempest
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : Ⅰ動詞1 (液體、氣體排出) let out; discharge; release 2 (泄露) let out (a secret); leak (new...
  • : Ⅰ動詞1 (從孔或縫中滴下、透出或掉出) leak; drip 2 (泄漏) divulge; disclose; leak 3 (遺漏) le...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全護措施:存取控制、標識和認證、完整性控制、密碼技術、火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對系統安全範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Shielding schemes of computer vdu are suggested through transient electromagnetic scattering analysis. method of time - domain integral equations is used here. a new soft - tempest method is found to strengthen protection capability of electromagnetic information leakage

    用時域積分方程法,通過瞬態電磁場分析推薦了計算機顯示器的屏蔽方案,提出soft - tempest技術的新措施以加強電磁護; 4
  3. Secondly the paper develops two new techniques that enable the software on a computer to control the electromagnetic radiation of crt monitor transmits at very low cost : digital filter and dithering technique, validates the two methods to reduce the information leakage by a experiment. aiming at the shortage of software process, this paper gives a new method which combines the software with hardware

    在此基礎上提出了兩種全新的視頻技術(數字濾波與偽發射技術) ,並且進行了實際測試和分析,驗證了它的有效性、可行性,然後針對它們的不足之處提出了一種軟體和硬體相結合的新方法。
  4. With jiangmin firewall protection, users do not have to worry about internet account, qq passwords, account numbers game, game equipment, bank account, e - mail passwords, personal privacy and other important personal information leakage

    有了江民火墻的保護,網民再不必擔心上網帳號、 qq密碼、游戲賬號、游戲裝備、銀行帳號、郵件密碼、個人隱私及其他重要個人
  5. Techniques for preventing information leakage of computer and its peripheral equipment

    計算機及其外部設備的防信息泄漏技術
  6. The bidders doubly encrypt the bidding files with the project certificate and the server certificate so that both tenderee and server ca n ' t open the bidding files before the unsealing moment. this step assures the bidding files safe so as to enable the tendering work to go on wheels. liu weiwei ( computer science and application ) directed by prof. cheng jingyun

    投標人利用項目證書和站點服務器證書對投標文件進行雙重加密,以避免招標人和站點服務器任何一方在開標之前打開投標文件,從而確保了投標文件的安全,止有人從中牟利,,破壞招投標工作的順利展開。
  7. Since data privacy is being destroyed seriously, how to prevent data leakiness is an important issue

    摘要基於現行數據隱私問題日益嚴重,如何止數據挖掘過程中隱私,將是一個重要的研究議題。
  8. Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "

    根據涉密網路對安全的特殊性,根據國家對涉密網路安全的相關規范,筆者對x所的網路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照系統安全工程的方法設計了針對該所整個網路系統物理安全、網路運行安全、安全保密以及安全保密管理等方面的解決方案,完成了網路安全域劃分、電磁、安全審計、網路安全管理、傳輸加密和訪問控制等工作。
  9. Abstract : this paper provides a deep analysis of three problems ( how to locate leakage in formation, how to intercept and reconstruct the leakage information, realizing the measurement of count er - intercept information leakage of protection of computer information leakag e ( tempest ). it also puts forward detail points of view and measurements, and makes a series of experiments on some coclusions

    文摘:針對目前的前沿- -計算機護( tempest )中的三大問題(如何尋求的部位,如何截取並復現,實現反竊取的措施)進行了剖析,提供了作者的見解,指出了可採取的技術措施,並針對有關結論開展了實驗研究
分享友人