information security 中文意思是什麼

information security 解釋
信息安全性
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. Cryptogram programming of confidential information is an effective tool for ensuring information security

    機密信息的密碼化是保證信息安全的一種有效手段。
  3. Meanwhile, ideas in research toward standardization of cryptogram form is provided to information security researching staff of inland and overseas

    也為國內外信息安全工作者對密文格式標準化研究提供了思路。
  4. Cryptology is the core of the information security. modern cryptograph divides into the public key system and the private key system

    密碼學是信息安全技術的核心,現代密碼體制分為公鑰體制和私鑰體制兩大類。
  5. Cryptology technique is the core of safeguarding information security

    密碼技術是保障信息安全的核心技術。
  6. Insp offers you pertinent information by telephone for the ranges project agency, consultancy and personnel search agency in addition to information security. contact insp

    作為一家知名的工業型企業, insp製造項目代理,信息安全系列內高質量的產品。
  7. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  8. Some experience of intranet information security management

    內網安全解決方案經驗談
  9. Stressing the need for everyone to act responsibly to ensure not just their own information security, mr wong said the highly interconnected nature of the information world meant we were dependent to a large extent on each other to assure the security of our data and systems. " for instance, while e - mail is becoming a common and efficient way of communication, it also poses potential threats to all it touches. and a likely tangible consequence to any laxity in our information security could be a costly negative impact on the conduct of our e - business.

    王錫泉強調,每個人都有責任去保護自己及其他人的資訊安全,現今的資訊世界高度互連,意味我們彼此之間互相倚賴以保障我們的數據和系統的安全。他說:例如,電郵雖已逐漸成為普及和有效率的通訊方法,但它同時會對所到之處構成潛在威脅。假如我們對資訊保安馬虎了事,便有可能對我們的電子業務運作造成代價不菲的負面影響。
  10. In the following chapters, the interoperable model of webgis, multi - level b / s architecture, multi - thread for network computing and concurrent access, dcom, intelligent agent, intelligent spatial search engine, information security are discussed in detail. with these key technologies, the system of publishment and analysis of city air quality based on webgis is designed and implemented

    借鑒這些關鍵技術,在arcims的基礎上,設計並實現了基於webgis的全國重點城市空氣質量發布系統,將空氣質量狀況與空間數據結合起來,生動直觀的反映了各主要城市的空氣質量狀況,方便了用戶的查詢,為環保事業作出應有的貢獻。
  11. In the age of information, security system does not mean a simple pure protection, but the great rivalship between the security officers ( so ) and virtual attackers ( va ). some cyberspace security systems only give the defense framework, which is the integration of different protection technologies based on the system security management requirements, but not based on the understanding of information rivalry

    在信息技術高速發展的時代,網路安全已不再是單純的防禦技術,而越來越成為安全管理員( securityofficers , so )與虛擬攻擊者( virtualattackers , va )之間信息與知識的對抗。
  12. Chun - chih peng and chung - huang yang, " design and implementation for integer factorization and primality testing tools with elliptic curve on windows platforms, " 2007 symposium on cryptography and information security, sasebo, japan, january 2007

    張家瀚、楊中皇,支援鏈結機制之標準化時戳實作, 2007知識社群與資訊安全研討會,文化大學, 2007年5月。
  13. Computer and network has spreaded all over the society. information security and sciential property right have been risen to a new level. it is a focused problem that how to protect data and software sciential property right in field of informational technology

    現代社會步入數字信息化高度發達的時代,計算機和網路遍及社會的每一個角落,信息安全和知識產權不可侵犯也提到了一個新的高度,如何保證數據信息的安全和軟體知識產權成了信息技術領域關心的熱點問題。
  14. Study on the information security risks and countermeasures

    信息安全風險及對策研究
  15. Anti - spam information security technology crimes

    打擊濫發訊息(資訊保安及科技罪行)
  16. Spark pc lock information security usb key launched

    新聞速遞星之春公司更名通知
  17. Dongle and spark pc lock information security usb key etc

    和電腦信息安全等領域
  18. A strategy of information security for windows platform

    平臺的一種信息安全策略
  19. Koal software, which is approved by the state secrets bureau, is one of the first qualification corporations on computer information system integration related to national secrets. koal software, a pilot unit of computer network security services authentication by the computer network and information security administrtion office, has an experienced team for information system integrated security construction and services management and implementation. to users, it is a reliable long - time system security provider

    格爾軟體是國家保密局批準的首批「涉及國家秘密的計算機信息系統集成」資質單位,是國信安辦認定的首批計算機網路安全服務試點單位,擁有一支經驗豐富的信息系統整體安全建設與安全服務的項目管理與實施隊伍,是用戶信息系統能夠得到長久安全保障的可信賴的信息安全服務商。
  20. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    信息隱藏是信息安全領域中的一項新興技術,主要有數字水印和數字密寫兩大分支,分別用於多媒體數據的版權保護和隱蔽通信。
分享友人