security risk
危险人物;不可靠分子;对国家安全的危害
2026-03-22 08:22 浏览次数 18
危险人物;不可靠分子;对国家安全的危害
1. someone who could damage an organization by giving information to an enemy or competitor
2. someone or something that is a risk to safety
Any package left unattended will be deemed a security risk.
Security y Risk Surveys安全风险调查
Security and Risk Management安全与风险管理
security and risk安全与风险
Security Investment Risk证券投资风险
Security y Risk Management安全风险管理
security market risk证券风险
security y risk安全隐患
Security Long Risk Position证券长仓风险仓位
Security Gross Risk Position证券整体风险仓位
An important method that complements the kinds of black-box testing described above — one that is particularly effective at uncovering security risk in application software — is manual code review.
上面描述的黑盒测试对于应用软件中未暴露的安全风险尤其有效。手工的审查代码,是对它的一个很重要的补充方法。
However, here is another workaround that do not need you to take security risk by disabling UAC.
然而,这是另一个解决方法,不需要您承担安全风险来禁用uac。
An security risk assessment model in Intranet is established, because of the network assessment problems.
针对内网安全评估问题构建了内网安全风险评估的系统模型。
Although Einstein was a brilliant physicist, the army considered Einstein a 17 security risk and to Einstein's relief did not invite him to help in the project.
虽然爱因斯坦是个聪明绝顶的物理学家,但军方认为他对国家安全有所威胁,并没请他参与曼哈顿计划,这可让他松了一口气。
This paper firstly provides the concept of the information security risk assessment.
信息安全风险评估是考察信息系统安全性的一个重要环节。
Today, with the highly developed information technology, the computer information security risk assessment has become one of the hot fields in the network security research.
而在信息化高度发展的今天,计算机网络的安全风险评估,是网络安全领域的研究热点之一。
Focus on troubleshooting the production site security risk really tapped.
重点排查生产现场的安全隐患是否真正挖掘出来。
Signatures of behavioral activity where applications and system resources are modified and might indicate a benign security risk or an attempt to access sensitive system information.
信息级别,已经不算真正意义上的威胁了,对于系统和应用程序资源的修改,对敏感系统信息的读取都属于此类。
These methods can be used for the security risk management of the physical education making decisions.
使用这些方法可以为学校体育安全风险管理决策提供依据。
At first, start with from procedure of information security risk assessment, describe the principle and step that risk calculate in the evaluation process especially.
首先从信息安全风险评估的流程入手,着重叙述了信息安全风险评估过程中风险计算的原理和步骤。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.
阐述了信息安全风险评估所要解决的问题,介绍了目前在信息安全风险评估领域的主要方法,并对这些方法进行了分析和评价。
Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.
信息安全风险评估是信息系统安全工程的重要组成部分,也是建立信息安全保障体系的基础。
This process is a security risk and should be removed from your system.
这项计划是重要的稳定和安全运行的计算机,而不应被终止。
This security risk is referred to as a cross-site scripting attack.
这种安全性风险被称为跨网站脚本攻击。
Issued a 「special security risk larger construction works programme expert appraisal review procedures」 to ensure that the special security construction works programme accuracy and security.
下发了《危险性较大工程安全专项施工方案专家论证审查办法》,确保各专项工程安全施工方案的準确性和安全性。