信息安全管理体系
- 网络Information Security Management System;ISMS
-
信息安全管理体系标准ISO17799
Information security management system standard ISO 17799
-
信息安全管理体系研究
Research on Information Security Management System
-
基于ISO17799信息安全管理体系风险评估
Risk Assessment of Information Security Management Based on ISO 17799
-
民航空管网络与信息安全管理体系的构建研究
Aviation Atc Network & Information Security Study Management System
-
在工业系统中构建信息安全管理体系,对工业系统正常高效地运行有重要意义。
This paper points out the importance of protecting information security for industrial system .
-
《信息安全管理体系审核认证机构的要求》标准解读
Introduce of " Requirements for bodies providing audit and certification of information security management systems "
-
信息安全管理体系审核指南国际标准提案进展
The Developing Process of Guidelines for Information Security Management Systems Auditing and its Progress of International Standard Proposal
-
比较详细地介绍信息安全管理体系的内容和构建信息安全管理的方法和途径。
The article depicts in detail about the content of the information security management system and its establishing methods approaches .
-
风险评估作为信息安全管理体系建设的基础,在体系建设的各个阶段发挥着重要的作用。
As the constructive basis of information security management system , risk evaluation plays an important role in every system construction .
-
ISO/IEC27001作为当前国际上具有代表性的信息安全管理体系标准,得到了越来越多国家的认可。
As a representational information security management system standard in the world , ISO / IEC 27001 gains recognition from more and more countries .
-
在整个体系建设中,提出了在原有基础上进行双体系建设,即:信息安全管理体系和信息安全技术体系的共同规划。
Throughout the system , I raised double original information security systems , namely : information security management system and common information technology security system .
-
烟草企业建立网络与信息安全管理体系标准,能有效地推动企业信息化水平与信息安全管理水平的提高,保证网络与信息的安全。
The standardization of the security management system of network and information could improve the management of information and security effectively , and ensure the security of network and information .
-
A市商业银行信息安全风险管理体系研究
Study on Information Security Risk Management System of Commercial Bank on A City
-
其次介绍了信息安全风险管理体系,其中包含信息安全风险评估方法&模糊数学理论、信息安全风险的识别等。
Secondarily this part introduced the information security risk management system , which includes information security risk assessment method-fuzzy mathematics , information security risk identification .
-
本文在当前已有理论成果的基础上,提出了与信息安全技术相适应的信息安全纵深管理体系,加强了两者之间的联系,提高了风险管理工作的地位。
Based on the current theory results , this paper builds the Management-in-Depth System of Information Security that adaptive to information security technology .
-
风险评估必须用到评估工具来完成对信息保护的工作,从而建立信息安全的管理体系。
Assessment tools are the guard for the information security on the risk assessment , and then we can establish the information security management system .
-
文章从信息安全的角度讨论了建立中医医院信息安全管理体系的必要性。
This paper discussed the necessity to construct information security management system in Chinese traditional medicine hospital from the view of information security .
-
本文介绍了企业信息化发展的现状,分析了企业信息安全存在的主要问题,并提出了构建企业信息安全管理体系的基本方法。
This paper introduces the developmental state of enterprises informationization . The main problems of enterprise information security are analyzed and the basic methods to build management architecture of enterprise information security are discussed .
-
信息安全问题直接影响着国防安全,特别是航天信息安全问题和信息安全管理体系的建立已逐渐成为国防建设的基础之一。
Information security directly affects national security , especially in the space of information security and information security management system which has gradually become one of the foundations of national defense .
-
但是,如果企业仅仅按照信息安全管理标准中的规定,建设了所需的所有文档,而没有信息安全管理系统支撑信息安全管理体系,那么企业是无法有效进行信息安全管理。
However , if a company only builds documents of information security management according information security management system standards , information security management does not execute efficiently without the support of information security management platform .
-
信息安全保障涉及方方面面,其中信息安全管理是关键环节之一,风险评估作为信息安全管理的重要内容,在信息安全管理体系建设的各个阶段发挥着重要的作用。
The Information Security involves many aspects , among them , Information Security Management is one of the key links , as the important content of Information Security Management , Risk Evaluation plays an important role at each stages of construction of Information Security Management System .