ID |
原文 |
译文 |
47496 |
通过对此平台技术原理和功能作用的剖析,揭示其作为高效信息安全产品具有很好的应用前景。 |
According to the analysis oftechnical principles and functions, this product has a promising future. |
47497 |
企业关键数据向移动终端设备延伸,使移动终端数据泄露成为企业面临的一个新的问题。 |
With the trend that enterprise key data moves to mobile terminal, data leakage prevention has become an im-portant issue on mobile terminal. |
47498 |
针对移动终端数据泄露问题,提出了基于预解密的透明加密技术,有效解决移动终端传统透明加密技术只能保证应用层安全的缺陷,并提升了透明加密性能。 |
To solve the problem, a pre-decryption transparent encryption technology was set up whichsolved the problem that traditional transparent encryption technology only can ensure application layer security, in addition,performance on mobile was improved. |
47499 |
同时,利用瘦客户端与移动终端数据防泄露相融合的思想,进一步设计面向移动终端的虚拟远程桌面技术,彻底屏蔽数据流传输的弊端,保证了移动终端数据的安全传输。 |
At the same time, taking advantage of the idea of combining thin client and mobileterminal to prevent leakage of data, a virtual remote desktop technology on mobile was proposed, which completely shieldthe shortcomings of data transmission and ensure the safe transmission of mobile terminal data. |
47500 |
在此基础上,设计与实现了一套面向移动智能终端的数据防泄露系统。 |
Finally, a data leakage pre-vention system for mobile terminal was set up, which makes the mobile terminal fully and effectively protected. |
47501 |
当前的入侵检测系统更多针对的是外部攻击者,但有时内部人员也会给机构或组织的信息安全带来巨大危害。 |
Current intrusion detection systems are mostly for detecting external attacks, but sometimes the internalstaff may bring greater harm to organizations in information security. |
47502 |
现有的内部威胁检测方法通常未将人员行为和业务活动进行结合,威胁检测率有待提升。 |
Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities, making the threat detection rate to be improved. |
47503 |
从内部威胁的实施方和威胁对系统业务的影响这 2 个方面着手,提出基于业务过程挖掘的内部威胁检测系统模型。 |
An insider threat detection system based on business process mining from two aspects was proposed, the implementationof insider threats and the impact of threats on system services. |
47504 |
首先通过对训练日志的挖掘建立系统业务活动的正常控制流模型和各业务执行者的正常行为轮廓, |
Firstly, the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log. |
47505 |
然后在系统运行过程中将执行者的实际操作行为与预建立的正常行为轮廓进行对比,并加以业务过程的控制流异常检测和性能异常检测,以发现内部威胁。 |
Then, the actualbehavior of the operators was compared with the pre-established normal behavior contours during the operation of thesystem, which was supplemented by control flow anomaly detection and performance anomaly detection of businessprocesses, in order to discover insider threats. |