The Federal Office for Security in Information Technology.
Security of information technology;
In the future,quantum physics could become the guarantor of secure information technology.她在学术上主要是研究信息技术安全和控制,并与别人合著了2本教科书和30多篇学术论文。 定期(每年至少一次)审查信息技术安全环境,因为它关系到网络、数据、产品控制和监控解决方案。
Review periodically(at least annually) the information technology security environment as it relates to the network, data, product controls and monitoring solutions.Combinations with other parts of speech
他们通常不运行支持常用信息技术安全工具的标准操作系统,或者仅仅是因为没有足够的内存。
They typically don't run standardoperating systems that support the commonly used information technology security tools or just don't have enough memory for them.EAL4+认证是安全保障的专项认证《信息技术安全评估准则》的其中一个评估等级,目前最高为EAL7级。
EAL4+ is an evaluation level in Information Technology Security Evaluation Criteria, which is a special security assurance certification with EAL7 as the highest level.信息技术安全干事将记录遵守程序的情况并确保程序得到遵守,包括、但不限于以下方面:.
The Information Technology Security Officer will document and ensure compliance with procedures, including but not limited to the following:.审计委员会曾建议儿童基金会改进其信息技术安全并与联合国其他组织协商完成其灾难恢复计划。
The Board had recommended that UNICEF improve its information technology security and, in consultation with other United Nations organizations, complete its disaster recovery plan.NASAOIG还就JPL未能及时更新信息技术安全数据库(ITSDB)而受到指责。
The NASA OIGalso blamed the JPL for failing to keep the Information Technology Security Database(ITSDB) up to date.NASAOIG还指责JPL未能使信息技术安全数据库(ITSDB)保持更新。
The NASA OIGalso blamed the JPL for failing to keep the Information Technology Security Database(ITSDB) up to date.信息技术安全评估通用准则》是由美国政府、加拿大和其他23个国家共同议定的国际标准。
The Common Criteria for Information Technology Security Evaluation is an international standard agreed to by the United States Government, Canada, and 23 other nations.国家代表接受了这些建议,而且目前正在对管理审查和信息技术安全实行更有效的措施。
The recommendations have been accepted by the country representative,with improved measures over management review and information technology security being implemented.(a)有些情况下,养恤基金的信息技术安全政策未得到全面执行;.
(a) Instances where the requirements of the Fund' s information technology security policy had not been fully implemented;除此之外,信息技术安全事故应对机构于2006年成立,以除其他外支助国家机构保障国家信息技术安全。
In addition, the Information Technology Security Incident Response Institution had been established in 2006 to provide support, inter alia, to State institutions in safeguarding national information technology security.此外,双方还将在信息技术安全培训领域展开合作,并开设相关课程。
The two sides will also cooperate in the field of information technology safety training and offer relevant courses.
Ukraine has also created itsown national system of criteria for assessing the security of information technologies.过去的若干年以来,美国在提请大会注意信息技术安全的威胁方面,一直发挥了主导作用。
In years past, her country had been a leader indrawing the attention of the General Assembly to threats to information technology security.他是一名软件工程师,拥有信息技术安全和行为工程硕士学位,以及MBA。
He is a software engineer with a Masters Degree in Information Technology Security& Behavioral Engineering and an MBA.网络安全与信息技术安全相关,信息技术安全的重点是保护计算机和存储在其中的机密数据免受网络罪犯的侵害。
Cyber security is coupled with information technology security, which focuses on protecting computers and confidential data stored in it from cyber criminals.这包括实施灾后复原持续运行计划、提高信息技术安全和执行观察员部队的通信及信息技术项目。
This includes the implementation of the disaster-recovery business continuity plan,enhancement of information technology security and the implementation of the Force' s communication and information technology project.他是一名软件工程师,拥有信息技术安全和行为工程硕士学位,以及MBA。
He is a software engineer with a Master's Degree in Information Technology Security and Behavioral Engineering, as well as an MBA.
The Office of Internal Oversight Services found that the information technology security policy need to be improved.在推出并卖出了一家成功的电子商务软件公司和一家信息技术安全公司后,利宾正在研究以电子方式增强人类记忆的可能性。
Having launched and sold a successful e-commerce software company and an information technology security firm, Libin was researching the possibilities of augmenting human memory electronically.委员会参照的是一套全面、普遍适用和普遍接受的信息技术安全和控制良好实践,称为"信息及相关技术控制目标"。
The Board referred to a comprehensive,generally applicable and accepted set of good information technology security and control practices called" control objectives for information and related technology".(aa)考虑核准信息技术安全政策;把正规化的信息技术安全政策传达到所有利益攸关方;定期监测遵守情况;.
(aa) Consider approval of the information technology security policy; communicate the formalized information technology security policy to all relevant stakeholders; and monitor compliance on a regular basis;(t)缺乏合格的信息技术人员、信息技术安全政策、业务连续性计划;实物安保和现场储存的备份材料不足。
(t) Lack of qualified information technology personnel, information technology security policies, and a business continuity plan; inadequate physical security and backup media stored on-site.