security audit 中文意思是什麼

security audit 解釋
安全審計
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • audit : n. 1. 會計檢查,查賬。2. (地主與佃戶間的)決算。vt. ,vi. 1. 檢查,查(賬)。2. 〈美國〉(大學生)旁聽(課程)。
  1. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    本文提出的體系結構中還引入了數據挖掘思想,利用數據挖掘技術中的關聯分析、分類等演算法從系統日誌、系統調用序列、網路流等海量的安全審計數據中提取關鍵的系統特徵屬性,根據這些屬性生成安全審計數據的分類模型用於入侵檢測。
  2. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混合型的結構,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  3. The digital rights management security audit log descriptive model presents what will be recorded by digital rights management security audit log

    摘要數字權限管理安全審計日誌記錄的內容由數字權限管理安全審計日誌描述模型給出。
  4. This paper puts forward " cause - context - result ( cause - context - result, ccr ) based digital rights management security audit log descriptive model " ; this model depicts digital rights management events from the point of digital rights management security audit

    通過對已有數字權限管理事件模型的分析,提出了「基於原因背景影響的數字權限管理安全審計日誌描述模型」 ;這個模型從數字權限管理安全審計日誌角度描述了數字權限管理事件。
  5. Discussion topics cover pearl river delta air traffic management planning and implementation, the satellite - based communications, navigation and surveillanceair traffic management systems applications, latest development of the co - operation arrangement on mutual acceptance of approval of aircraft maintenance organisations signed by aviation authorities in the mainland, hong kong and macau, implementation of the regulated agent regime in hong kong to enhance air cargo security, safe transport of dangerous goods by air, and security audit conducted by the international civil aviation organisation

    討論議題包括珠江三角洲航空交通管理的規劃和實施,衛星通訊、導航及監察?航空交通管理系統的應用,由內地、香港和澳門民航局簽訂的互相認可航空器維修單位批準合作安排的最新發展,為提高航空貨運保安水平而實施的管理代理人制度,妥善空運危險品,以及國際民用航空組織進行之航空保安審計事宜。
  6. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    本文的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計日誌方法,它可以支持目前常見系統的日誌文件,確保系統被入侵攻擊前的日誌文件記錄不被篡改、刪除,使得入侵者在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各類系統不同日誌文件組成日誌文件庫,為獲取和分析日誌文件的記錄提供支持; 3 )對各類日誌文件的記錄採用關聯分析,更有效的提取潛在的計算機犯罪線索。
  7. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  8. The thesis proposed a powerful sequence evaluation method. it was a rule based method designed especially for intrusion detection analysis. it is fitful for the analysis of b3 level security audit data, can undertake efficiently huge amount of data analysis task

    本文基於russel語言給出了一個強大的序列分析評估方法,它是特別針對入侵檢測分析拘基於規則的方法,適用於b3級的安全審計數據的分析,能夠高效地執行大數:據量的分析任務。
  9. Based on the apa platform presented by golden eagle international group software system limited company, this paper concentrates on the key operation domain, designs one security audit monitor system model

    本文針對關鍵業務領域,在金鷹國際集團軟體系統有限公司提出的apa ( applicationprocessaudit ,應用過程審計)平臺基礎上,構建了一個安全審計監控系統模型。
  10. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  11. By the end of september 2002 all recommendations made by the auditors in the 2001 it security audit were followed through and implemented. other it security enhancement measures were completed

    迄2002年9月,審查人員在2001年資訊科技保安核查報告所提出的建議已全部落實。
  12. Audit data analyzing approach for security audit system

    安全審計數據的綜合審計分析方法
  13. This document acts as a supplementary document to it security guidelines to give an introduction to a generic reference model for it security risk assessment and security audit

    這是《資訊科技保安指引》的補充文件,概述適用於保安風險評估及審計的參考模型。
  14. Our research project is basic condition platform construction project of the national science and technology of the ministry of science and technology. this paper researches the security audit techniques which watch and track actions in network information systems, and develops audit tool software. on the base of technology research, we will constitute technology standards that have own intelligence property, so that we could enhance network recovery capability to protect important computer information systems

    本文課題是科技部國家科技基礎條件平臺建設項目,研究對網路信息系統進行全面監視和對網上行為進行跟蹤的安全審計技術,開發符合信息安全管理需要的審計工具軟體,為構建網路安全信息系統提供技術支持,並在技術研究的基礎上研究制定具有自主知識產權且能與國際接軌的技術標準,以提高國內信息網路防禦能力,保護國家關鍵基礎設施,維護國家事務、經濟建設、國防建設、尖端科學技術等重要領域的計算機信息系統的安全。
  15. Security managment subsystem provides koal enterprise ca system with security audit service and security safeguard service

    安全管理子系統為整個格爾企業證書認證系統提供了安全審計服務和安全防護服務。
  16. Information technology. open systems interconnection. systems management. security audit trail function

    信息技術.開放式系統互連.系統管理.安全審核跟蹤功能
  17. Information technology - open systems interconnection - systems management : security audit trail function

    信息技術.開放式系統互連.系統管理:安全審查跟蹤功能
  18. Information technology - open systems interconnection - systems management - part 8 : security audit trail function

    信息技術開放系統互連系統管理第8部分:安全審計跟蹤功能
  19. Research on security audit in e - government

    電子政務的安全審計研究
  20. Two security audit events are also provided for service broker

    還為service broker提供了兩個安全審核事件。
分享友人