security audit mechanism 中文意思是什麼

security audit mechanism 解釋
安全審計制度
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • audit : n. 1. 會計檢查,查賬。2. (地主與佃戶間的)決算。vt. ,vi. 1. 檢查,查(賬)。2. 〈美國〉(大學生)旁聽(課程)。
  • mechanism : n 1 (機械)結構;機械裝置[作用];(故事的)結構。2 【哲學】機械論 (opp vitalism)。 3 【文藝】...
  1. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  2. Linux has been more and more widely used today, but the secure degree of linux is low, so in this paper, we produce a linux - compatible secure operating system, named slinux. its design object is in accordance with the requirements of the fourth level, i. e. structured protection level, of gb17859. for this purpose, we introduce such mechanism, as identification & authentication, mac, least privilege manage, trusted path, password management. object reuse, covert and channel analysis. furthermore, we have some innovation, introduce the mechanism of network security and audit

    本論文的研究目的是對linux進行安全增強,設計一個新的安全操作系統,即slinux安全操作系統,其設計目標是滿足gb17859第四級《結構化保護級》的需求,為此我們在原有linux操作系統的基礎上引入了標識與鑒別機制, mac機制,最小特權管理機制,可信通路機制,密碼處理機制,客體重用機制以及隱通道分析機制,同時還進行了創新,引入了網路安全保護機制和審計機制。
  3. Intrusion detection system is an active security technology developed in the recent decade, which integrates detection, audit, alert and response function. as an important part in information security mechanism, it supplies a gap for access control and identity authentication, thus becoming a main study area. in this thesis, the various intrusion detection models and detection methods are firstly categorized and studied, merits and defaults of which are discussed in detail, then the intrusion response system and intrusion traceback are studied

    本論文對現有的各種入侵檢測模型和技術進行了系統歸類和分析研究,詳細討論了各檢測分析技術的優點和存在的不足;對入侵響應系統和入侵追蹤技術進行了初步的研究;在研究基於靜態自治代理和移動代理的入侵檢測基礎上,設計了一種基於多代理的分散式入侵檢測與響應系統模型( multi - agent - basedintrusiondetectionresponsesystem , maidrs ) 。
  4. The tradional audit mechanism are introduced. comparing with feathure of embedded filesystem, the paper presents a multiple - level security audit system. flexible method of the audit storing enhances the dependability of audit information

    通過靈活的審計存儲方法,提高了審計信息的可信度;同時,通過審計的兩級實時報警和對審計信息的事後分析,提高了審計信息的利用率。
分享友人