data audit 中文意思是什麼

data audit 解釋
數據質控
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • audit : n. 1. 會計檢查,查賬。2. (地主與佃戶間的)決算。vt. ,vi. 1. 檢查,查(賬)。2. 〈美國〉(大學生)旁聽(課程)。
  1. Concern the provision of audit work station according to accounting method, if an accounting clerk manages debt already, provide check again, apparent and easy cheat, should give so prohibit ; the accountant record of an unit is custodial, it is the accountant such as budget of forms for reporting statistics of book of zhang of all sorts of prooves that point to this pair of units, accountant, accountant, financial plan, unit and important contract data, after be being collected regularly, examine a nucleus to be opposite, arrange stand roll, schedule, bound into book custodial, if allow a person to manage the debt of an unit already, keep again accountant record, made motion easily on debt apparently later the action that the opportunity of record of recycle government accountant covers him, give so prohibit : the registering job of items of an account of debt of the income of an unit, defray, charge, creditor ' s rights, the much that includes station of work of charge to an account but not be all ( for instance cash journal and bank come - and - go journal are not included ), this part charge to an account works, it is the foundation of business accounting of an unit accountant, also be the basis that produces cash come - and - go, also cannot hold part - time by cashier personnel, a person manages debt already, manage charge to an account again the basis that this produces debt come - and - go, very easy defalcate

    根據會計法有關稽核工作崗位的規定,假如一個會計工作人員既管錢款,又管復核,顯然輕易作假,所以要予以禁止;一個單位的會計檔案保管,是指對本單位的各種憑證、會計賬簿、會計報表、財務計劃、單位預算和重要的合同等會計資料,定期收集后,審查核對,整理立卷,編制目錄、裝訂成冊的保管,假如答應一個人既治理一個單位的錢款,又保管會計檔案,顯然輕易在錢款上做了手腳之後再利用治理會計檔案的機會掩蓋自己的行為,所以予以禁止:一個單位的收入、支出、費用、債權債務賬目的登記工作,包括記賬工作崗位的大部分但不是全部(比如現金日記賬和銀行往來日記賬就不包括在內) ,這部分記賬工作,是一個單位會計核算的基礎,也是發生現金往來的根據,也不能由出納人員兼任,一個人既治理錢款,又治理記賬這一發生錢款往來的根據,很輕易監守自盜。
  2. The present situation and development countermeasures of electronic data processing audit

    電算化審計的現狀及發展對策
  3. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. Discharge declaration and registration have large data size, strong logicality, high professional requirements as the characteristics, so environmental protection departments must strive to strengthen the audit to obtain integrated and accurate data reporting

    摘要排污申報登記工作具有數據量大、邏輯性強、專業要求高的特點,環保部門必須力求通過強化數據的審核來獲得完整、準確的排污申報數據。
  6. According to all discussed above, adopted typical mobile agent system ibm aglets to design a framework of mobile agent based intrusion detection system and various functional mobile agents, analyzed data collection, detection and tracing of intruding attacks of the concurrent multiple mobile agents. those mobile agents trace and watch the network equipments and hosts in real time, study net flow and status of the hosts, analyze and audit the outcome data, then give real time alarms for the aggressive activities

    在此基礎上,採用典型移動代理系統ibmaglets設計了一種基於移動代理的入侵檢測系統框架,並設計了不同功能的移動代理,分析多個移動代理協作進行數據採集與跟蹤檢測入侵攻擊的過程,這些移動代理實時跟蹤監視網路設備和主機,了解網路上的流量和主機的狀態,並對結果數據進行分析審計,做出一定的響應。
  7. Data protection - data protection - pre - audit workbook

    數據保護.預審核工作手冊
  8. Process choreographer writes audit log data to the

    流程編排器將審核日誌數據寫入該流程編排器數據庫的
  9. The capture data lineage sample is a package that captures audit information

    捕獲數據沿襲示例是用來捕獲審核信息的包。
  10. The big shortcoming of current ids is unable to detect intrusion behavior quickly when facing large amount of audit data, unable to detect new type of attacks, and high false positive rate which influence greatly the performance of ids

    當前ids的最大弱點是面對海量的審計記錄無法快速檢測入侵行為,並且誤報率之高嚴重影響了系統性能。
  11. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    本文提出的體系結構中還引入了數據挖掘思想,利用數據挖掘技術中的關聯分析、分類等演算法從系統日誌、系統調用序列、網路流等海量的安全審計數據中提取關鍵的系統特徵屬性,根據這些屬性生成安全審計數據的分類模型用於入侵檢測。
  12. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混合型的結構,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  13. If a user believes that the general audit does not provide sufficient information for his or her purpose, the user has the option of obtaining more data

    如果報表的使用者認為這種由審計人實施的審計不能提供足夠的信息以滿足他(她)的需要,他(她)可以想法獲得更多的資料。
  14. The firm ' s review of laboratory data does not include the audit trail / revision history to determine if unapproved changes have been made

    公司實驗室數據的復核沒有包括用來決定是否有未經批準的變更的審計追蹤/版本歷史。
  15. Data protection - pre - audit workbook

    數據保護.預審計工作手冊
  16. The enforcement of such standards and procedures permit diverse applications to share data, meet audit and control requirements, and be shares by multiple users

    這種標準和程序的執行允許不同的應用分享數據,應付審核和控制條件,和被廣泛用戶共享。
  17. This article describes how the audit log is set up, and what data is written to the audit log table

    本文描述了如何建立審核日誌,以及什麼樣的數據要寫入審核日誌表中。
  18. Integrating the audit system to collect the data of system call and privilege command in the kernel, the raas could analyze datas and compare to the user normal behavior from the normal library

    結合原審計系統,在內核層收集系統調用和特權命令的數據,分析過后與用戶正常庫比較,達到監控的目的。
  19. Data audit in large scale clinical trial of traditional chinese medicine

    中醫藥大規模臨床研究的數據核查
  20. This article starts with and dissertate these key technologies such as middle component, multimedia large object, connection and snap shop of database, data transactions of distributed databases, data security issue in distributed databases, data backup and recovery of databases and data audit in detail. the discussion would be done combining with some practical projects and previously developed systems from the software engineering point of view and achieve research results which had been applied and validated in the projects and systems

    所以本文從這幾個關鍵技術入手,從軟體工程的角度出發,結合多個實際項目和以前開發的系統為基礎,從系統設計的基本思想、思路出發,結合一些基本依據分別以組件中間件、多媒體大數據對象、數據庫的鏈接與快照、分散式數據庫數據的處理、分散式數據庫數據的安全問題、數據庫的備份和恢復以及數據審計等具體問題進行比較詳細的論述,並且將得到研究結果在項目和系統中予以實現加以驗證。
分享友人