正在加载图片...
Protection and Security-Preventing harm to the system and to resources, either through wayward internal processes or malicious outsiders Authentication, ownership, and restricted access are obvious parts of this system Highly secure systems may log all process activity down to excruciating detail, and security regulation dictate the storage of those records on permanent non-erasable medium for extended times in secure off-site facilities• Protection and Security - Preventing harm to the system and to resources, either through wayward internal processes or malicious outsiders. • Authentication, ownership, and restricted access are obvious parts of this system. • Highly secure systems may log all process activity down to excruciating detail, and security regulation dictate the storage of those records on permanent non-erasable medium for extended times in secure ( off-site ) facilities
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有