organization of information security 中文意思是什麼

organization of information security 解釋
信息安全組織
  • organization : n. 1. 組織,構成;編制。2. 體制,機構;【生物學】生物體。3. 團體,公會,協會。4. 〈美國〉(政黨的)委員會。adj. -al
  • of : OF =Old French 古法語。
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Special organization developed mechanism of jiangsu public security safety of network of information of key internet unit is checked greatly, check key internet information to serve an unit in all 2627, hidden danger of next safety of hairnet sth resembling a net rectify and reform advice note 104, still rent to mandatory lead plane and fictitious space safety administration has repair, outstanding to 4 problems internet data center is executed hang out one ' s shingle supervise and direct, the course is rectified and reform, delete bawdy pornography information in all 2570

    江蘇公安機關專門組織開展了重點網際網路單位信息網路安全大檢查,共檢查重點網際網路信息服務單位2627家,下發網路安全隱患整改通知書104份,還對託管主機和虛擬空間出租安全治理進行整治,對4家問題突出的網際網路數據中心實行掛牌督辦,經過整改,共刪除淫穢色情信息2570條。
  2. It is designed to provide the administrative body of an organization with a set of essential elements of information security management. it also provides a common language and a system framework of information resource protection, comprehensible and acceptable to both information specialists and high level management. in addition, the paper puts forward on the basis of detailed analysis a platform for the implementation of information security management

    本文作者針對國內信息系統安全管理的普遍性問題和海關信息系統安全管理中的具體實踐,較為系統地對信息系統安全管理的體系框架進行了研究,旨在給管理層一整套可裁剪的信息安全管理要素及「量體裁衣」的原則和方法、一套與管理高層進行溝通的共同語言以及保護信息資產的制度框架,是管理高層能夠接受並理解的,從而克服管理層和it應用層在信息系統安全方案規劃、實施和系統維護等方面的認識局限性,有利於達成信息系統安全保障體系的共識。
  3. It points out that the construction of technical report system depends on the systemic rules, the cooperation between government department and science & technical information organization, and the effective security measures as well

    指出完善的法規制度體系、科研管理部門和科技信息部門共同參與的管理機制以及嚴格的安全管理機制是確保科技報告產生、提交和交流利用的重要保障,以期對建設中國科技報告體系有所借鑒和啟示。
  4. Through the integration of the existing networks of emergency command and organization of disaster accidents, a unified, normalized, scientific and highly efficient command system for disaster accident emergency handling and command is to be set up ; through integration of the existing resources for disaster accident emergency handling, a security system for disaster accident emergency handling with definite division of labor, responsibilities affixed to persons, advantages made complementary and all - time preparedness is to be established ; and through integration of the existing information system of disaster accidents, a precaution system for disaster accident emergency handling with information shared, mechanism optimized, preventive measures taken, and disaster reduction made in a scientific way is to be instituted

    通過整合現有災害事故緊急指揮和組織網路,建立統一、規范、科學、高效的災害事故緊急處置指揮體系;通過整合現有災害事故緊急處置資源,建立分工明確、責任到人、優勢互補、常備不懈的災害事故緊急處置保障體系;通過整合現有災害事故的信息系統,建立信息共享、機制優化、防患未然、科學減災的災害事故緊急處置防範體系。
  5. This thesis demonstrated in detail the bank organization, operation procedures, security requirement analysis, etc. it also lucubrated the information security theory, and analyzed the information security structural levels. based on the above results, a security design scheme was developed from a technically and operationally integrated consideration for e - banking system in beijing agriculture bank. technique factors consisted of security controls of website, including the firewall strategies, break - in testing and system scanning, ca digital certification system and security controls

    在研究了信息安全的相關理論的基礎上,提出了北京農行網上銀行系統的技術和業務上綜合考慮的安全設計方案,前者包括針對網站的安全控制,如包括防火墻策略、入侵檢測和系統掃描、 ca數字證書體系、安全控制等,後者以個人業務、對公業務、銀券通業務等流程說明業務的安全實現。
  6. This paper stresses on discussing the architecture, access protocol and implementation mechanism based on xml and web services technologies, researches key technologies of metadata information service and data uniform access and management in database grid, designs and implements distributed mis subsystem and das subsystem, which support multi - domain management. mis can provides metadata information for the whole system, such as das and clients, it uses domain name 、 logical name and internal name of data object to uniformly name database resources in grid and implements name mapping mechanism and user view metadata information service and provides virtual organization and management of database resources. das can provide a scalable uniform data access by virtual organization and management of storage resources and multi - mode data share access mechanism, thus integrate database resources in grid and shields distribution and heterogeneity of resources and achieves transparent access. system adopts data access mechanism based on user request mapping to flexibly implement data access across multi domains, and adopts distributed data cache mechanism 、 security mechanism based gsi to provide high - performance secure data service for grid users

    本文論述了griddaen - dai系統的邏輯結構、訪問協議、數據服務流程以及基於webservices 、 xml等技術的實現策略,重點研究數據庫網格中的元服務、數據統一訪問和管理等關鍵技術,設計和實現了支持多管理域的分散式元服務子系統和數據訪問服務子系統。其中元服務主要為整個系統提供各種元信息支持,它採用域名、數據對象的邏輯名稱、物理名稱和內部名稱對廣域環境下的數據庫數據進行了統一命名,實現了相應的名字映射機制和全局的用戶數據視圖服務,提供了數據庫資源的虛擬組織與管理方式;數據訪問服務通過提供可擴展的統一數據訪問和支持多種數據共享訪問模式,屏蔽了數據庫資源的分佈性和異構性,為用戶提供了統一透明的數據服務。
  7. Considering the joining of subcontracting system, the quality, progress, cost, security of the project are controlled and decided by subcontracting to a great extent and the importance of the constructing of information and contract management, we suggest to build an agile organization from the aspects of quality, cost, controlling of operation, building of information and contract management

    由於分包體系的加入,工程的質量、進度、成本控制很大程度決定於分包單位,同時信息系統建設,合同管理也更加重要,因此,從質量、成本、進度的控制和信息系統建設、合同管理方面,提出了敏捷型組織實施的建議。
  8. The fao country profiles and mapping information system presents the organization s vast archive of knowledge on agriculture and food security within a single web - based portal, with groupings by country and thematic area

    糧農組織國家概況及繪圖信息系統在一個網站入口按國家和專題領域提供本組織關于農業和糧食安全的大量資料。
  9. Article 3. the computer management and supervision organization of the ministry of public security is responsible for the security, protection and management of computer information networks and the internet

    第三條公安部計算機管理監察機構負責計算機信息網路國際聯網的安全保護管理工作。
  10. Article 12. connecting network units, entry point units, and corporations that use computer information networks and the internet and other organizations ( including connecting network units that are inter - provincial, autonomous region, municipalities directly under the central government or the branch organization of these units ) should, within 30 days of the opening of network connection, carry out the proper registration procedures with a unit designated by the public security organization of the provincial, autonomous region, or municipality directly under the central government peoples ' government

    第十二條互聯單位、接入單位、使用計算機信息網路國際聯網的法人和其他組織(包括跨省、自治區、直轄市聯網的單位和所屬的分支機構) ,應當自網路正式聯通之日起三十日內,到所在地的省、自治區、直轄市人民政府公安機關指定的受理機關辦理備案手續。
  11. Network security incident response linkage system makes human and information resources of the incident response organization be in harmony to deal with the network security incidents. there is n ' t any abroad - accepted model about it up to now

    網路安全事件應急響應聯動系統的主要目的是協調應急響應組織人力與信息等資源合作應對網路安全事件,目前尚未有廣泛接受的模型。
  12. Organization for information, computer and network security professionals. includes details of upcoming events and seminars and monthly newsletter for members

    -一個與安全的新聞和論壇,包含有關軟體的下載技術性文章和政策法規。
  13. Sources of risk to information security include, but are not limited to, people or hardware within or outside the organization ( figure 2 )

    信息安全風險的來源包括(但並不限於)機構內部或者外部的人或硬體(圖2 ) 。
  14. An international non - profit organization of information security professionals and practitioners. it provides education forums, publications and peer interaction opportunities

    -民間安全組織,發布網路安全知識的相關文檔,公布最新的系統漏洞以及補丁等。
  15. Access control, as one of 5 standard security services defined by the international standard organization, is an important mechanism for the security of information systems

    訪問控製作為國際化標準組織定義的五項標準安全服務之一,是實現信息系統安全的一項重要機制。
  16. As a part of is ( information security ), also one of the standard security services established by iso ( international standard organization ). access control is used to protect important resources, for instance, prohibits illegal user ’ s access to the confidential resources, restricts legal users ’ operation in their permitted set of operation and prevents resources from damages due to carelessness

    作為信息安全體系的一部分,同時也是國際化標準組織定義的五項標準安全服務之一,訪問控制在保護重要資源方面有相當重要的作用,包括防止非法用戶訪問機密信息,限制合法用戶的非法操作,以及由於疏忽所造成的誤操作對資源的破壞。
  17. Considered to requirement of the university and the training organization to offer information security experiment in local and the distance education, in order to reduce cost and obtain the high performance, the information security virtual experiment platform based on the web service has been developed

    考慮到高校、培訓機構開展本地及遠程網路教育信息安全實驗的需要,從節約成本和保證性能的角度出發,開發基於web服務的信息安全虛擬實驗平臺。
  18. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
分享友人