Chinese translation for "iatf"
|
- 国际汽车产业工作小组
信息安全保障技术框架 信息保障技术框架
Related Translations:
- Example Sentences:
| 1. | Only iatf registrars are authorized to conduct the surveillance audit 仅仅iatf登记官被授权进行监视审计。 | | 2. | 32 registrars are sought out in the current pilot program with iatf 32个登记官外面与iatf在当前的飞行员节目被寻求。 | | 3. | 10 permit aqa to provide copies of the final assessment report to anab , iatf , aaqg , or faa , as appropriate 在适当的情况下,允许aqa将最终的审核报告复印件提交给anab , iatf , aaqg或者faa 。 | | 4. | Firstly , it introduces the information security theories and technologies used in the study . the information security theories mainly includes ppdr - the dynamic security model , sse - cmm , padminee - the life cycle of information security engineering model , bs7799 - the standard of information security management , the grade - classification standard of information system security protection , iatf - the technical framework of information security guarantee and the principle of wooden pail etc . and the information security technologies consist of the technology of firewall , invasion detection , virus prevention and cure , loophole scanning , the identity certification and the soc etc . then it studies on the designing of the information security guarantee system 首先,介绍和分析与本研究相关的主要信息安全理论与技术,其中信息安全理论有ppdr动态安全模型、 sse - cmm系统安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理标准、信息系统安全保护等级划分准则、 iatf信息安全保障技术框架和木桶安全理论等;信息安全技术有防火墙技术、入侵检测技术、计算机病毒防治技术、漏洞扫描与评估技术、身份认证技术和soc技术等。 | | 5. | The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security 第一章对信息保障的历史进行回顾,介绍在信息保障的发展历程中有关信息安全的概念和方法,如:引用监视器( rm ) 、引用确认机制( rvn ) 、可信计算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。 | | 6. | And an algorithm for checking the consistency of the policies is given . in order to fully understand the ia , chapter 4 first gives a brief introduction of the " information assurance technical framework ( iatf ) " , and then according to the speciaity of the development of china ' s information technology a " special assurance " prob1em and technology that is often ignored by the normal " ia " technoiogy is brought forward 为全面了解信息保障,第四章首先简要介绍了信息保障技术框架( fatf ) ,然后针对我国信息技术发展的特殊性,提出了为常规保障技术所忽视的“特种保障”问题和技术,并且围绕着恶意功能的作用方式,深入研究了恶意功能的检测和防范方法。 |
- Similar Words:
- "iatcg" Chinese translation, "iatcp" Chinese translation, "iate" Chinese translation, "iatefl" Chinese translation, "iateria" Chinese translation, "iatfis" Chinese translation, "iather" Chinese translation, "iathergy" Chinese translation, "iati" Chinese translation, "iatica" Chinese translation
|
|
|