Mobile
Log In Sign Up
Home > english-chinese > "iatf" in Chinese

Chinese translation for "iatf"

国际汽车产业工作小组
信息安全保障技术框架
信息保障技术框架


Related Translations:
ne iatf on hrd:  近东人力资源开发机构间工作队
Example Sentences:
1.Only iatf registrars are authorized to conduct the surveillance audit
仅仅iatf登记官被授权进行监视审计。
2.32 registrars are sought out in the current pilot program with iatf
32个登记官外面与iatf在当前的飞行员节目被寻求。
3.10 permit aqa to provide copies of the final assessment report to anab , iatf , aaqg , or faa , as appropriate
在适当的情况下,允许aqa将最终的审核报告复印件提交给anab , iatf , aaqg或者faa 。
4.Firstly , it introduces the information security theories and technologies used in the study . the information security theories mainly includes ppdr - the dynamic security model , sse - cmm , padminee - the life cycle of information security engineering model , bs7799 - the standard of information security management , the grade - classification standard of information system security protection , iatf - the technical framework of information security guarantee and the principle of wooden pail etc . and the information security technologies consist of the technology of firewall , invasion detection , virus prevention and cure , loophole scanning , the identity certification and the soc etc . then it studies on the designing of the information security guarantee system
首先,介绍和分析与本研究相关的主要信息安全理论与技术,其中信息安全理论有ppdr动态安全模型、 sse - cmm系统安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理标准、信息系统安全保护等级划分准则、 iatf信息安全保障技术框架和木桶安全理论等;信息安全技术有防火墙技术、入侵检测技术、计算机病毒防治技术、漏洞扫描与评估技术、身份认证技术和soc技术等。
5.The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security
第一章对信息保障的历史进行回顾,介绍在信息保障的发展历程中有关信息安全的概念和方法,如:引用监视器( rm ) 、引用确认机制( rvn ) 、可信计算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。
6.And an algorithm for checking the consistency of the policies is given . in order to fully understand the ia , chapter 4 first gives a brief introduction of the " information assurance technical framework ( iatf ) " , and then according to the speciaity of the development of china ' s information technology a " special assurance " prob1em and technology that is often ignored by the normal " ia " technoiogy is brought forward
为全面了解信息保障,第四章首先简要介绍了信息保障技术框架( fatf ) ,然后针对我国信息技术发展的特殊性,提出了为常规保障技术所忽视的“特种保障”问题和技术,并且围绕着恶意功能的作用方式,深入研究了恶意功能的检测和防范方法。
Similar Words:
"iatcg" Chinese translation, "iatcp" Chinese translation, "iate" Chinese translation, "iatefl" Chinese translation, "iateria" Chinese translation, "iatfis" Chinese translation, "iather" Chinese translation, "iathergy" Chinese translation, "iati" Chinese translation, "iatica" Chinese translation