共查询到20条相似文献,搜索用时 312 毫秒
1.
分析了包装行业企业信息处理现状,阐述了Internet/Intranet的功能和特点,以及Internet/Intranet在包装杆业的应用领域,分析了企业建立Internet/Intranet网络方案的选择方法;提出了纸包装企业Internet/Intranet建设方案。 相似文献
2.
基于Internet/Intranet的质量信息系统重构技术研究 总被引:3,自引:0,他引:3
研究了基于web浏览器的质量信息系统运行方式和质量信息系统的重构分类方法,在此基础上,提出了基于Internet/Intranet质量信息系统的结构框架和重构流程,以此来映射和完成基于Internet/Intranet的质量信息系统的功能,以适应敏捷制造中动态联盟的结构变化性和快速响应的要求。 相似文献
3.
本文介绍了人民法院计算机信息网络系统的建设和实施方案。提供建设规范和方案选型,作为Internet/Intranet网络系统应用到系统集成的经验和成果。包括方案论证、系统实施、网络选型、安全措施等。 相似文献
4.
5.
随着国家认证认可条例的颁布和实施,认证检测成为空调器进入市场必经的第一道关卡。空调器的认证检测主要包括安全认证、能效认证和性能认证这几个方面的内容,其中安全认证主要以IEC/EN60335-2-40/UL484/UL1995为认证标准,本文主要阐述了空调认证的认证内容及重要性,分析了空调器产品安全认证检测中常见的问题,包括产品标志、机械安全、电气安全等方面存在的问题及产品其他方面的问题,并针对这些问题简要提出相应的解决对策,以期为空调器的认证检测提供参考和意见。 相似文献
6.
7.
《技术监督实用技术》1997,(6)
中国质量认证信息网正式开通1997年8月28日,中国标准化协会、中国技术监督情报研究所在京联合召开新闻发布会。大会宣布:“中国质量认证信息网”已出现在全球计算机互联网(Internet)上,正式向世界开通。因此,中国质量认证工作踏上了信息高速公路。“... 相似文献
8.
随着我国科学技术的不断发展和网络信息技术的不断成熟,基于数字化的身份认证系统在各个领域被广泛的运用。身份认证系统在企业的信息管理和信息安全中发挥着重要作用,对于能源企业来说,因为其企业的特殊性,对于内部信息的安全要求程度更高,建立一套性能良好,稳定可靠的身份认证系统显得至关重要。本文就身份认证系统的特点进行了阐述,并分析了身份认证系统在应用过程中容易出现的问题,提出了身份认证系统在能源企业中的应用措施。 相似文献
9.
阐述将S/MIME安全机制和HTTP摘要认证进行结合,从而提高SIP通讯安全的设想,该构想的实现可极大的提高多媒体通讯安全。 相似文献
10.
介绍了基于实例的敏捷制造信息系统结构。结合Interet/Intranet和人工技术,提出了基于智能代理机制的信息系统实现方案。系统采用VRML虚拟现实技术实现信息跨平台浏览共享,并讨论了基于成本和敏捷度的新产品设计优化方法。 相似文献
11.
12.
Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information, but also the expansion of areas and assets to be protected. In terms of information security, it has led to an enormous economic cost due to the various and numerous security solutions used in protecting the increased assets. Also, it has caused difficulties in managing those issues due to reasons such as mutual interference, countless security events and logs’ data, etc. Within this security environment, an organization should identify and classify assets based on the value of data and their security perspective, and then apply appropriate protection measures according to the assets’ security classification for effective security management. But there are still difficulties stemming from the need to manage numerous security solutions in order to protect the classified assets. In this paper, we propose an information classification management service based on blockchain, which presents and uses a model of the value of data and the security perspective. It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain. The proposed service reduces assets to be protected and security solutions to be applied, and provides security measures at the platform level rather than individual security solutions, by using blockchain. In the rapidly changing security environment of Industry 4.0, this proposed service enables economic security, provides a new integrated security platform, and demonstrates service value. 相似文献
13.
本文结合ISO/IEC27001-2013新版标准,在信息安全管理体系国家标准即将正式颁布之前,将2013版对照2005版予以解析,以期加深对新版信息安全管理体系标准的理解,从而提出在信息安全管理换版方面的重点建议。 相似文献
14.
15.
In consideration of business information sharing, this paper investigates a new game of information sharing and security investment between two allied firms. Firms’ strategies in three decision models (Nash Equilibrium decision, partially centralised decision and totally centralised decision) are analysed. We provide some quantitative analyses on how some parameters affect firms’ decisions in the three decision models. Our Nash Equilibrium analysis shows that when firms make decisions individually, they will share no information with each other. When information sharing is determined by a social planner, firms will share some information with each other, which increases the risk of information leakage. Thus, firms should increase their security investments to mitigate the higher information leakage risk. However, our analysis shows that instead of investing more in information security, firms will reduce their security investment, which will further aggravate the risk. Hence, a social planner is required to designate the security investments and information sharing levels for both firms. Our theoretical analysis shows that firms’ strategies can achieve global optimality in the totally centralised decision model. Furthermore, a numerical experiment is conducted and the result demonstrates that totally centralised decision model is more efficient than the other two decision models. At last, we propose two compensation mechanisms to help firms coordinate their strategies when making decisions individually. 相似文献
16.
The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliable services focused on security internalization, it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment information in medical artificial intelligence. We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to overcome such threats. We verified the proposed countermeasures through a survey of experts. Security requirements were defined based on the information life cycle in the medical convergence environment. We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes. 相似文献
17.
Sadeeq Jan Omer Bin Tauqeer Fazal Qudus Khan George Tsaramirsis Awais Ahmad Iftikhar Ahmad Imran Maqsood Niamat Ullah 《计算机、材料和连续体(英文)》2021,66(1):631-645
Over the last decade, a significant increase has been observed in the use
of web-based Information systems that process sensitive information, e.g., personal, financial, medical. With this increased use, the security of such systems
became a crucial aspect to ensure safety, integrity and authenticity of the data.
To achieve the objectives of data safety, security testing is performed. However,
with growth and diversity of information systems, it is challenging to apply security testing for each and every system. Therefore, it is important to classify the
assets based on their required level of security using an appropriate technique.
In this paper, we propose an asset security classification technique to classify
the System Under Test (SUT) based on various factors such as system exposure,
data criticality and security requirements. We perform an extensive evaluation of
our technique on a sample of 451 information systems. Further, we use security
testing on a sample extracted from the resulting prioritized systems to investigate
the presence of vulnerabilities. Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and
also found several vulnerabilities in them. 相似文献
18.
19.
The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and
risk (S&R) value of the network urgently. In this paper, we summarize the architecture
and vulnerability in IoT and propose a comprehensive information security evaluation
model based on multi-level decomposition feedback. The evaluation model provides an
idea for information security evaluation of IoT and guides the security decision maker for
dynamic protection. Firstly, we establish an overall evaluation indicator system that
includes four primary indicators of threat information, asset, vulnerability, and
management, respectively. It also includes eleven secondary indicators of system
protection rate, attack detection rate, confidentiality, availability, controllability,
identifiability, number of vulnerabilities, vulnerability hazard level, staff organization,
enterprise grading and service continuity, respectively. Then, we build the core algorithm
to enable the evaluation model, wherein a novel weighting technique is developed and a
quantitative method is proposed to measure the S&R value. Moreover, in order to better
supervise the performance of the proposed evaluation model, we present four novel
indicators includes residual risk, continuous conformity of residual risk, head-to-tail
consistency and decrease ratio, respectively. Simulation results show the advantages of
the proposed model in the evaluation of information security for IoT. 相似文献
20.
The paper presents an improved e-learner model that supports monitoring of user behavior related to information security. The model is built upon standardized IMS specification, according to literature research and survey conducted among e-learners. It is positioned as key part of an extended LTSA architecture in which the learner data is used to improve learner security position by continuous delivery of important information and adapting security mechanisms. The implementation is considered in Moodle LMS. 相似文献