
哪位大虾麻烦帮我用英文翻译一下,在下急用,谢谢,我把我的积分都给你了!!
6、系统的安全性(1)网络的安全性数字图像网络借助于公安专网,因此不允许与其他网络直接互联,保证公安网的安全性。(2)软件系统的安全性操作系统的安全规范必须满足国际C2级...
6、系统的安全性
(1)网络的安全性
数字图像网络借助于公安专网,因此不允许与其他网络直接互联,保证公安网的安全性。
(2)软件系统的安全性
操作系统的安全规范必须满足国际C2级标准,可以保证不被黑客所攻击。数据库的高级用户帐号及密码由服务器的系统管理员设定,数据库的普通用户帐号及密码权限由数据库高级用户(数据库管理员)设定。系统定时自动将主数据库服务器的数据备份到备份服务器中。系统维护人员可随时方便地对数据进行备份和恢复。
(3)应用程序的安全性
所有的操作人员进入系统前应通过工号和密码进行登陆,并通过认证服务器认证,核对准确后方可进入系统。
所有的操作人员均授予相应的级别及权限,任何越权的操作必须被拒绝。所有的操作与登陆信息均应有记录,并可以根据工号或密码进行查询。除基本资料外,工作人员不得对用户的其它资料或数据进行篡改,除非是系统的授权人员。
(4)数据通信的安全性
对于在公安网上传输的重要图像数据,为了防止被窃取或篡改,可考虑适当的加密措施,对数据进行加密。尽可能选用具有一定加密功能的数字设备,以对流经的数据进行加密,录像资料可通过水印手段进行加密。
7、系统的可扩展性
随着系统的扩容,用户数量会不断扩大,对新功能的要求也将不断增加。这要求系统具备良好的可扩性,因而在建设初期,除了满足现有要求之外,还必须考虑系统的可扩容性,以保证今后发展的需求。
系统的各个组成部件选用标准的硬件和软件,采用模块化设计,使系统可以通过增加模块的方式进行扩容;系统的接口要求规范化,从而使软、硬件能够平滑升级或更新,网络节点的增减对网络性能没有影响。 展开
(1)网络的安全性
数字图像网络借助于公安专网,因此不允许与其他网络直接互联,保证公安网的安全性。
(2)软件系统的安全性
操作系统的安全规范必须满足国际C2级标准,可以保证不被黑客所攻击。数据库的高级用户帐号及密码由服务器的系统管理员设定,数据库的普通用户帐号及密码权限由数据库高级用户(数据库管理员)设定。系统定时自动将主数据库服务器的数据备份到备份服务器中。系统维护人员可随时方便地对数据进行备份和恢复。
(3)应用程序的安全性
所有的操作人员进入系统前应通过工号和密码进行登陆,并通过认证服务器认证,核对准确后方可进入系统。
所有的操作人员均授予相应的级别及权限,任何越权的操作必须被拒绝。所有的操作与登陆信息均应有记录,并可以根据工号或密码进行查询。除基本资料外,工作人员不得对用户的其它资料或数据进行篡改,除非是系统的授权人员。
(4)数据通信的安全性
对于在公安网上传输的重要图像数据,为了防止被窃取或篡改,可考虑适当的加密措施,对数据进行加密。尽可能选用具有一定加密功能的数字设备,以对流经的数据进行加密,录像资料可通过水印手段进行加密。
7、系统的可扩展性
随着系统的扩容,用户数量会不断扩大,对新功能的要求也将不断增加。这要求系统具备良好的可扩性,因而在建设初期,除了满足现有要求之外,还必须考虑系统的可扩容性,以保证今后发展的需求。
系统的各个组成部件选用标准的硬件和软件,采用模块化设计,使系统可以通过增加模块的方式进行扩容;系统的接口要求规范化,从而使软、硬件能够平滑升级或更新,网络节点的增减对网络性能没有影响。 展开
4个回答
展开全部
是不是这样?:
6th, system's security
(1) network security
Digital image network with the aid in public security special network, therefore does not allow with other networks to interconnect directly, guarantee public security network's security.
(2) software system's security
Operating system's security specifications must satisfy international C2 the level standard, may guarantee that is not attacked by the hacker. The database high-quality user account number and the password establish by server's system manager, the database average consumer account number and the password jurisdiction (database administrator) establish by the database high-quality user. The system fixed time automatic will advocate database server's data backup to the backup server. The system maintenance personnel may momentarily conveniently carry on the backup and the restoration to the data.
(3) application procedure security
Before all operators enter the system, should carry on the debarkation through the labor number and the password, and through authentication server authentication, after checkup accurate, only then enters the system.
All operators award the corresponding rank and the jurisdiction, any exceeds authority the operation must reject. All operations and the debarkation information should have the record, and may carries on the inquiry according to the labor number or the password. Besides the basic document, the staff do not carry on the distortion to user's other material or the data, only if is the systematic authorized officers.
(4) data communication security
Regarding in public security on-line transmission important image data, to prevent to steal or the distortion, may consider that the suitable encryption measure, carries on the encryption to the data. Selects as far as possible has certain encryption function digital equipment, by transfers the data which passes through to carry on the encryption, the video material may carry on the encryption through the watermark method.
7th, system's extendibility
Along with system's dilatancy, user quantity will expand unceasingly, unceasingly will also increase to the new function's request. This request system has the good expandability, thus in the construction initial period, besides satisfies the existing request, but must consider that the system may expanding, guarantee from now on will develop demand.
System's each building block selects the standard the hardware and the software, uses the modular design, enables the system to be possible through to increase the module the way to carry on the dilatancy; System's connection request standardization, thus enables the software and hardware to promote smoothly or the renewal, node's fluctuation has not affected to the network performance.
6th, system's security
(1) network security
Digital image network with the aid in public security special network, therefore does not allow with other networks to interconnect directly, guarantee public security network's security.
(2) software system's security
Operating system's security specifications must satisfy international C2 the level standard, may guarantee that is not attacked by the hacker. The database high-quality user account number and the password establish by server's system manager, the database average consumer account number and the password jurisdiction (database administrator) establish by the database high-quality user. The system fixed time automatic will advocate database server's data backup to the backup server. The system maintenance personnel may momentarily conveniently carry on the backup and the restoration to the data.
(3) application procedure security
Before all operators enter the system, should carry on the debarkation through the labor number and the password, and through authentication server authentication, after checkup accurate, only then enters the system.
All operators award the corresponding rank and the jurisdiction, any exceeds authority the operation must reject. All operations and the debarkation information should have the record, and may carries on the inquiry according to the labor number or the password. Besides the basic document, the staff do not carry on the distortion to user's other material or the data, only if is the systematic authorized officers.
(4) data communication security
Regarding in public security on-line transmission important image data, to prevent to steal or the distortion, may consider that the suitable encryption measure, carries on the encryption to the data. Selects as far as possible has certain encryption function digital equipment, by transfers the data which passes through to carry on the encryption, the video material may carry on the encryption through the watermark method.
7th, system's extendibility
Along with system's dilatancy, user quantity will expand unceasingly, unceasingly will also increase to the new function's request. This request system has the good expandability, thus in the construction initial period, besides satisfies the existing request, but must consider that the system may expanding, guarantee from now on will develop demand.
System's each building block selects the standard the hardware and the software, uses the modular design, enables the system to be possible through to increase the module the way to carry on the dilatancy; System's connection request standardization, thus enables the software and hardware to promote smoothly or the renewal, node's fluctuation has not affected to the network performance.
展开全部
6, system security
(1) network security
Network through the use of digital imaging network security professionals, it does not allow direct interconnection with other networks to ensure the safety of the public security network.
(2) the security of software systems
Operating system must meet the international safety norms C2-class standards, to ensure not to be attacked by hackers. Senior database user account and password from the system administrator configure the server, the database user account and password advanced user permissions from a database (database administrator) configuration. Automatic timing system, the main database server data backup to the backup server. System maintenance personnel are readily available to offer to the data backup and recovery.
(3) the security of applications
All the operators into the system should be adopted before the job number and password login and authentication through the authentication server to verify the accuracy required for entry into the system.
All the operators are given the corresponding levels and permissions, the operation of any authority must be rejected. Operation and landing of all information should be recorded and can be based on job number or password query. In addition to basic information, staff may not be the user's other information or data tampering, unless they are authorized officer system.
(4) the security of data communications
Public Order online for an important image data transmission, in order to prevent theft or tampering, encryption may consider appropriate measures, to encrypt data. As far as possible, choose a certain number of encryption devices to encrypt data flowing through, video data can be encrypted watermark means.
7, system scalability
With the system expansion, the number of users will continue to expand the requirements of the new features will also be increasing. This requires the system to have good scalability, so early in the building, in addition to meet the existing requirements, but also must take into account the expansion of the system may be to ensure that future development needs.
System selection criteria for the various components of hardware and software, the use of modular design, the system can be a way to increase module capacity expansion; systems require standardized interfaces so that software and hardware to upgrade or update, the network node by reduction did not affect the network performance.
大概就是这样了
(1) network security
Network through the use of digital imaging network security professionals, it does not allow direct interconnection with other networks to ensure the safety of the public security network.
(2) the security of software systems
Operating system must meet the international safety norms C2-class standards, to ensure not to be attacked by hackers. Senior database user account and password from the system administrator configure the server, the database user account and password advanced user permissions from a database (database administrator) configuration. Automatic timing system, the main database server data backup to the backup server. System maintenance personnel are readily available to offer to the data backup and recovery.
(3) the security of applications
All the operators into the system should be adopted before the job number and password login and authentication through the authentication server to verify the accuracy required for entry into the system.
All the operators are given the corresponding levels and permissions, the operation of any authority must be rejected. Operation and landing of all information should be recorded and can be based on job number or password query. In addition to basic information, staff may not be the user's other information or data tampering, unless they are authorized officer system.
(4) the security of data communications
Public Order online for an important image data transmission, in order to prevent theft or tampering, encryption may consider appropriate measures, to encrypt data. As far as possible, choose a certain number of encryption devices to encrypt data flowing through, video data can be encrypted watermark means.
7, system scalability
With the system expansion, the number of users will continue to expand the requirements of the new features will also be increasing. This requires the system to have good scalability, so early in the building, in addition to meet the existing requirements, but also must take into account the expansion of the system may be to ensure that future development needs.
System selection criteria for the various components of hardware and software, the use of modular design, the system can be a way to increase module capacity expansion; systems require standardized interfaces so that software and hardware to upgrade or update, the network node by reduction did not affect the network performance.
大概就是这样了
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
建议通过支付宝等形式付款翻译
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
6, system security
(1) network security
Network through the use of digital imaging network security professionals, it does not allow direct interconnection with other networks to ensure the safety of the public security network.
(2) the security of software systems
Operating system must meet the international safety norms C2-class standards, to ensure not to be attacked by hackers. Senior database user account and password from the system administrator configure the server, the database user account and password advanced user permissions from a database (database administrator) configuration. Automatic timing system, the main database server data backup to the backup server. System maintenance personnel are readily available to offer to the data backup and recovery.
(3) the security of applications
All the operators into the system should be adopted before the job number and password login and authentication through the authentication server to verify the accuracy required for entry into the system.
All the operators are given the corresponding levels and permissions, the operation of any authority must be rejected. Operation and landing of all information should be recorded and can be based on job number or password query. In addition to basic information, staff may not be the user's other information or data tampering, unless they are authorized officer system.
(4) the security of data communications
Public Order online for an important image data transmission, in order to prevent theft or tampering, encryption may consider appropriate measures, to encrypt data. As far as possible, choose a certain number of encryption devices to encrypt data flowing through, video data can be encrypted watermark means.
7, system scalability
With the system expansion, the number of users will continue to expand the requirements of the new features will also be increasing. This requires the system to have good scalability, so early in the building, in addition to meet the existing requirements, but also must take into account the expansion of the system may be to ensure that future development needs.
System selection criteria for the various components of hardware and software, the use of modular design, the system can be a way to increase module capacity expansion; systems require standardized interfaces so that software and hardware to upgrade or update, the network node by reduction did not affect the network performance.
(1) network security
Network through the use of digital imaging network security professionals, it does not allow direct interconnection with other networks to ensure the safety of the public security network.
(2) the security of software systems
Operating system must meet the international safety norms C2-class standards, to ensure not to be attacked by hackers. Senior database user account and password from the system administrator configure the server, the database user account and password advanced user permissions from a database (database administrator) configuration. Automatic timing system, the main database server data backup to the backup server. System maintenance personnel are readily available to offer to the data backup and recovery.
(3) the security of applications
All the operators into the system should be adopted before the job number and password login and authentication through the authentication server to verify the accuracy required for entry into the system.
All the operators are given the corresponding levels and permissions, the operation of any authority must be rejected. Operation and landing of all information should be recorded and can be based on job number or password query. In addition to basic information, staff may not be the user's other information or data tampering, unless they are authorized officer system.
(4) the security of data communications
Public Order online for an important image data transmission, in order to prevent theft or tampering, encryption may consider appropriate measures, to encrypt data. As far as possible, choose a certain number of encryption devices to encrypt data flowing through, video data can be encrypted watermark means.
7, system scalability
With the system expansion, the number of users will continue to expand the requirements of the new features will also be increasing. This requires the system to have good scalability, so early in the building, in addition to meet the existing requirements, but also must take into account the expansion of the system may be to ensure that future development needs.
System selection criteria for the various components of hardware and software, the use of modular design, the system can be a way to increase module capacity expansion; systems require standardized interfaces so that software and hardware to upgrade or update, the network node by reduction did not affect the network performance.
参考资料: http://translate.google.cn/translate_t#
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询