• The article depicts in detail about the content of the information security management system and its establishing methods approaches.

    比较详细地介绍信息安全管理体系内容构建信息安全管理的方法和途径

    youdao

  • It is expected that an information security management system implementation will be scaled in accordance with the needs of the organization.

    按照组织需要实施信息安全管理体系本标准所期望的。

    youdao

  • Assessment tools are the guard for the information security on the risk assessment, and then we can establish the information security management system.

    风险评估必须用到评估工具完成对信息保护的工作,从而建立信息安全管理体系。

    youdao

  • This paper discussed the necessity to construct information security management system in Chinese traditional medicine hospital from the view of information security.

    文章信息安全角度讨论建立中医医院信息安全管理体系必要性

    youdao

  • This International Standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system.

    标准用于为建立实施保持持续改进信息安全管理体系提供要求

    youdao

  • The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.

    美国国土安全部需要了解商用电子绩效管理系统实用性用于人力资源管理。

    youdao

  • The information security guarantee system framework can be divided into the security management framework and the security technology framework.

    为了系统地、完整地构建企业信息安全保障体系,考虑技术体系管理体系共同构建。

    youdao

  • Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.

    通过研究本文信息系统安全管理指导作用,对制造企业信息系统安全管理借鉴作用

    youdao

  • To ensure systems security must think over network, operating system, application and operation demand etc in the synthetical information management systems of electric power corporations.

    电力企业综合信息管理系统中,必须网络操作系统应用程序业务需求各方面保证系统的安全

    youdao

  • However, for any information system, robust and effective security management mechanism is the fundamental guarantee to the legally use of information.

    然而对于任何一个信息系统健壮有效安全管理机制合法使用信息基本保障

    youdao

  • The management of the user usually relates to the data security problem of the managing information system.

    用户管理往往涉及到一个信息管理系统数据安全问题

    youdao

  • The paper particularly and thoroughly studied the structure design and the performance optimizing and the security management of the database on a certain military information system.

    本文军用信息系统数据库基本结构设计、数据库系统性能优化、数据库安全管理进行了深入细致的研究。

    youdao

  • The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.

    本文从管理流程技术教育审计方面出发,通过多项措施有机结合,企业打造一个良好信息安全体系

    youdao

  • Conclusion Intranet security management system can effectively guarantee information security of hospital Intranet and greatly improve work efficiency of network maintenance personnel.

    结论内网安全管理系统能够有效保障医院内网信息安全和大幅提高网络维护人员工作效率

    youdao

  • Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.

    数据完整性信息系统安全目标之一该文描述了一个时间相关数据库管理系统完整性策略模型

    youdao

  • The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.

    企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制管理控制。

    youdao

  • NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.

    NET构建了学校信息管理系统本文介绍系统的整体设计数据库访问方法数据安全防范措施

    youdao

  • The security of ERP information management system was considered firstly when the small and medium enterprises implemented ERP system.

    ERP信息管理系统软件安全性中小型企业实施ERP系统必须考虑的问题。

    youdao

  • In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.

    管理技术角度出发,提出相应的解决方案,消除医院信息系统安全隐患

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • Management of user authority is an important component of welding application software. It's concerned with the security of system information, the user's operation and the authority, etc.

    用户权限管理焊接应用软件重要组成部分之一,关系系统信息安全、用户对软件操作使用权限等重要问题,焊接应用软件是否实用的重要标志。

    youdao

  • The system can process the security and navigation information aptitudinally, which make it suitable for the modern shipping management requirement much more.

    由于智能化处理安全信息导航信息使符合现代船舶管理系统要求

    youdao

  • It is the most important task of security construct to build E-government Information security guarantee system. Information security Management is one of key link in the guarantee system.

    信息安全管理其中关键环节之一,风险评估作为信息安全管理的重要内容信息安全管理体系建设各个阶段发挥着重要的作用。

    youdao

  • The Information system Security management does not involve only the management system or only the relevant techniques, but includes the relevant strategies, management and techniques.

    信息安全管理单单是管理体制技术问题,而是策略、管理技术有机结合。

    youdao

  • The first chapter emphasizes on the importance of information system security. It introduces modern security management theories and the BS7799 security management standard.

    第一重点阐述信息安全管理重要性介绍现代安全管理思想引入国外的BS 7799安全管理标准。

    youdao

  • However, since no system can ever be 100 percent secure, a prevention-only approach to information security management is not enough.

    然而,从来没有一些系统保证100%的安全仅仅阻止接近信息安全系统也是不够的。

    youdao

  • To ensure systems security must think over network, operating system, application and operation demand etc in the synthetically information management systems of electric power corporations.

    电力企业综合信息管理系统中,必须网络操作系统应用程序业务需求各方面保证系统的安全

    youdao

  • The factory did not regularly hold meetings that are attended by senior management to address information technology issues, including system security.

    工厂没有定期举行高级管理人员参加的会议解决信息技术问题包括系统的安全性。

    youdao

  • The company regularly holds meetings that are attended by senior management to address information technology issues, including system security.

    公司定期举办高级管理人员参加的会议解决信息技术问题包括系统的安全性。

    youdao

  • So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.

    因此本文主要分为两个重要组成部分信息系统风险分析管理过程基于RBAC安全模型设计

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定