operating system security 中文意思是什麼

operating system security 解釋
操作系統安全性
  • operating : adj 1 運行的;操作的;工作的。2 關于業務的;營業上的;關于收支的。operating expenses 業務開支;營...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured

    操作系統是唯一緊靠硬體的基本軟體,其安全職能是其他軟體安全職能的根基,缺乏這個安全的根基,構築在其上的應用系統以及安全系統,如pki 、加密解密技術的安全性是得不到根本保障的。
  2. Operating system security conspectus

    操作系統安全三
  3. Debian gnu linux is the first choice as base operating system for innominate when developing standard and customized security appliances for a long time

    數年來, innominate在開發標準及特殊訂做的網路安全產品時, debian gnu linux一直是他們基礎操作系統的第一選擇。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. Besides, to enforce the security of authentication process, in this thesis we propose the design and implementation of a passwd checker and mandatary identification and authentication mechanism in ercist 4. 0 secure operating system

    本文還介紹了安勝4 . 0安全操作系統中口令檢查器和強身份認證機制的設計和實現,以增強鑒別過程的安全性。
  6. The main way rogue programs get into a system is by exploiting security holes in the operating system

    惡意的程序進入系統的主要方法是利用操作系統的安全性漏洞。
  7. The security mechanism of network database is related with many aspects. though the analysis of architecture and software arrangement, i divide this problem into four layers : network security mechanism, dbms security mechanism, operating system ( server ) security mechanism and application system security mechanism

    從體系結構和軟體層次上思考,筆者將其分為網路安全機制、服務器操作系統安全機制、數據庫管理系統安全機制和應用系統安全機制四層。在這個層次結構中,每一層都有自己的一套機制,完成自己的任務,實現一定的安全內容。
  8. In the light of the main factors influencing the safe broadcasting of digital audio workstation system, this paper advances some measures from aspects of dual server ' s fault - tolerant technology, raids, security of operating system and database, security of exchanger, and calibrating technique for time, etc

    針對影響數字音頻工作站系統安全播出的主要因素,從服務器雙機容錯技術、冗餘磁盤陣列、操作系統及數據庫安全性、交換機的安全性、時間的校準技術等方面提出了措施。
  9. Nowadays, network security problems getting worse and worse, the demand for secure operating system is in impendence

    在網路安全問題日益嚴重的今天,對安全操作系統的需求非常迫切。
  10. Secure operating system places its focus on controlling user ’ s access to prevent illegal operations, marking the user and authentication to guarantee the security and integrality. access control technology plays an important role to enforce operating system security. now, research on access control in embedded real time operating system ( ertos ) is just at the prime stage

    操作系統安全的主要目標包括根據系統安全策略對用戶的操作進行訪問控制,防止其對計算機資源的非法存取;標識用戶並進行身份鑒別;保證操作系統運行的安全性;保證系統自身的安全性和完整性。
  11. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ), mandatory access control ( mac ) and least privilege management. finest granularity dac allows that the owner of an object can choose to grant access permission to any other user

    本論文主要在文件訪問控制和特權管理這兩方面對linux的安全性進行增強,即實現了細粒度的自主訪問控制、強制訪問控制、以及最小特權管理。
  12. In this dissertation the integrated and privilege - role extended unix operating system security model, which is based on the blp model, is discussed

    在對blp模型進行分析的基礎上,提出了以blp模型為基礎的完整性和特權角色擴展的unix操作系統安全模型。
  13. Some meta - schedulers rely on the underlying operating system security

    有些元調度器要依賴于底層的操作系統的安全性。
  14. Operating system security based policies for computer virus prevention

    基於操作系統安全的計算機病毒防禦策略
  15. Most of the default operating system security settings are not configured to minimize security loopholes

    大部分操作系統的默認安全設置並未配置為最小化安全漏洞。
  16. Developing the linux - based secure operating system is mainly to enhance the linux operating system security

    基於linux開發安全操作系統,主要是對linux的安全性進行增強。
  17. Grants the asp. net application permissions to access any resource that is subject to operating system security

    授予asp . net應用程序訪問任何資源的權限(受操作系統安全性的限制) 。
  18. Data warehouse tool : the db2 data warehouse center security structure is separate from the database and operating system security

    數據倉庫工具: db2 data warehouse center安全性結構是與數據庫和操作系統的安全性相分離的。
  19. Namespace, operating system security requirements such as access control lists acls must be satisfied for access to be allowed

    System . io命名空間中使用類時,要使訪問被允許,則必須滿足諸如訪問控制列表( acl )等操作系統安全性要求。
  20. As a core component in embedded system, operating system security is the fundament of all the applications based on it and the whole system

    操作系統作為嵌入式系統的核心,它的安全是構築在其上的應用以及整個系統安全性的根本保障。
分享友人