信息安全特性
-
目前保证这些信息安全特性的主要手段,是利用基于数论理论的公钥加密机制和技术实现。
Now the public-key encryption is the main method to protect the information security features , which is based on the arithmetical theory .
-
它还拥有阻止未授权类检索个人信息的安全特性。
It also has the security features to prevent unauthorized classes from retrieving personal information .
-
目前的针对信息产品安全特性的测试主要依赖个人的经验对安全性进行判断,所以人为因素对测试质量有很大的影响。
However , testing process of information security software now depends highly on experience and competence of security theory of the testers .
-
继承类内的信息流安全特性可以使用传统的信息流研究方法,继承类间的信息流安全特性则使用基于流的概念进行研究。
We consider research for the security properties of information flow of active network as properties of the inheriting class inner flow and flow among different inheriting classes .
-
简述了通信网络中的安全威胁,重点描述了美军通信系统中通用信息安全模块的功能特性和开发应用情况。
This paper describes in brief the security threats in communications network , describes mainly the functional properties and development applications of the Common INFOSEC Module ( CIM ) in the communications system of US force .
-
分析了航空运输信息中各类信息的内容和安全特性,介绍了数据库安全的基本概念,并阐述了建立数据库安全策略的步骤和方法。
The content and the basic conceptions for establishing a set of database security strategies were put forward .
-
本文在研究了信息安全风险评估相关理论及电力信息网络安全特性的基础上,通过引入模糊综合评判法以及变精度粗糙集理论,设计了电力信息网络风险评估模型。
A risk assessment model is designed introducing the fuzzy comprehensive evaluation method and Variable Precision Rough Set ( VPRS ) on the basis of studying related theories about information security risk assessment and electric power information network security features .
-
本文首先讨论了当前信息系统安全体系的理论,分析了信息安全的特性,信息安全的结构层次以及当前金融银行的安全环境。
The up-to-date theory of information system security architecture is discussed in this thesis at first . Then the security environment of current financial bank and the features , structure , layer of information security are analyzed .
-
简述当前金融网络安全威胁与现状,介绍了金融网络安全防范关键技术,针对金融网络信息安全的主要组成部分提出了防范技术综合应用,针对金融网络信息的安全特性提出了发展策略。
In this paper we discuss the menace of financial network information security and its present state . Some key defense techniques are introduced . The development strategies should be brought up after we study the saft characteristic of financial network information .