共查询到20条相似文献,搜索用时 15 毫秒
1.
U盘作为灵活的移动存储载体,广泛运用于各种终端间的数据传输.但普通U盘本身的安全性很难得到保障,容易成为病毒的载体,甚至导致不同程度的泄密.本文结合数据单向传输的特点,针对病毒查杀的滞后性,基于VC平台,设计并实现了一种U盘保密软件,可以在一定条件下保障U盘在电脑间传输数据时的安全性. 相似文献
2.
《Network Security》2001,2001(12):14-15
A company’s website is critical to it’s business. It relies on the site to provide information to its customers — as an interface to communicate with them or sell goods online. As such, it needs to be available 24 hours a day, seven days a week, providing a lightening fast response with first grade security. These things cannot always be achieved without a significant up-front investment and huge on-going costs. For many organizations it is a lot to take on. Unless a company has in-depth internal technical resources, outsourcing may be the way to go. Outsourcing promises to reduce the expense and eliminate many of the headaches associated with running an active and successful website. 相似文献
3.
The primary concern of CRM is core customers from convergence environments. They show such passionate partnership with the company that they actively put forth their opinion to improve products and service through voluntary pro-company activities and participate in the development of new products through open innovation. Therefore, the top priority of a company should be given to defining its core customers and accurately understanding and managing them, which would contribute to the growth of the company. This study has the purpose to identify net promoter score (NPS) of company by adopting index that evaluates the degree of customer loyalty to the company in judging the relationship of company and customer, and later on establish strategy to increase the number of loyal customers by classifying customers by the score. It has become more important nowadays how to manage a long-term customer relationship, for it can assure the company of increased income in spite of steep competition with rival companies. Therefore strong customer relationship is an important means of proving the company with competitive edge and maximizing company income. In addition, as NPS serves as adjustment variable, net promoters were analyzed to contribute to store loyalty significantly. The way for bookstore ‘A’ to grow as a company with potential for future growth would be re-establish customers through one more in-depth analysis of customers as well as seek for methods to raise NPS. 相似文献
4.
5.
6.
7.
张丽 《数字社区&智能家居》2009,(36)
近年来随着互联网的迅猛发展,计算机病毒呈现与繁殖传播越来越严重。电子邮件、浏览器、U盘已成为人们相互学习和交流的工具。然而,这些工具也随之成为计算机网络病毒的重要传播媒介。目前,由于计算机病毒广泛传播,已经成为计算机安全与应用的重要问题,该文首先从计算机病毒概念入手,简要分析了当前计算机病毒的特点、传播途径及感染后的主要症状。并针对这一现象提出了相应的防范措施。 相似文献
8.
U盘的普及使U盘病毒繁衍迅速,针对信息系统安全保护的需要,设计出一种U盘病毒隔离器。该隔离器具有隔离Autorun病毒、防止PC的数据通过U盘泄密、防止PC中的病毒感染U盘的功能。隔离器能够快速捕获到U盘与主机之间所有底层数据,在此基础上,隔离器中的微控制器(MCU)通过分析、审计和过滤流过隔离器中的底层数据来实现上述功能。经实际检测,该设计能够实现预定功能。 相似文献
9.
10.
F. Thuring J.P. Nielsen M. Guillén C. Bolancé 《Expert systems with applications》2012,39(10):8809-8816
Insurance policies or credit instruments are financial products that involve a long-term relationship between the customer and the company. For many companies a possible way to expand its business is to sell more products to preferred customers in its portfolio. Data on the customers’ past behaviour is stored in the company’s database and these data can be used to assess whether or not more products should be offered to a specific customer. In particular, data on past claiming history, for insurance products, or past information on defaulting, for banking products, can be useful for determining how the client is expected to behave in other financial products. This study implements a method for using historical information of each individual customer, and the portfolio as a whole, to select a target group of customers to whom it would be interesting to offer more products. This research can help to improve marketing to existing customers and to earn higher profits for the company. 相似文献
11.
How can you tell if an IT security product (or a product that includes security components) can secure your application? How can you be certain that a product will fully deliver on its claims that it will protect against malice in a deployed environment? Unfortunately, few vendors - and even fewer customers - can make these judgments. The article won't make you a security wizard, but it will give you a feel for what to look for in, and when to be concerned about, a vendor's claims. To ensure that a product has a chance of being secure; customers should check that vendors use adequate approaches in four primary areas. In order of importance (and maturity and availability), they are: quality-control (QC) mechanisms; cryptographic primitives; hardware assist mechanisms; and separation mechanisms. 相似文献
12.
随着信息技术的发展,计算机被广泛应用于各个领域,其稳定性和安全性变得日益重要。本文主要通过对系统及时备份、硬盘数据保护、系统及病毒库定期更新的维护方案的分析,从而建立安伞的信息系统。进而在构建信息系统安全的实践中,提出一种适合研究所计算机网络系统心刖的三级安全管理措施设想,论述了信息系统安全的技术措施,并对建立管理制度提出建议。 相似文献
13.
云计算具有巨大商机,但同时也面临着潜在的巨大风险,云安全问题是云计算发展的重要障碍。应用云安全技术识别和查杀病毒不再仅仅依靠本地硬盘中的病毒库,而是依靠庞大的网络服务,实时采集、分析和处理。文章着重从查杀病毒和木马的角度来阐述有关云安全的技术以及实现,探讨了云安全问题的概念和所涉及到的技术问题,研究了资源池的建立及杀毒产品对云安全策略的各种解决方案。 相似文献
14.
Phillip Q. Maier 《Information Systems Management》2000,17(2):1-8
Extranets are revolutionizing the way in which companies conduct business with suppliers, customers, and other business partners. They are opening up new channels for sharing information and conducting transactions by linking a company's internal networking system to external networks. As extranets open new business opportunities for a company, they also expose its internal networks to new security and performance risks. By identifying these risks, IS managers can develop network architectures to secure and guarantee extranet performance. 相似文献
15.
16.
17.
18.
19.
计算机是信息系统的重要组成部分,它面临来自外部和内部的信息安全威胁。目前计算机终端上的防护方式主要针对来自网络和外部的病毒、木马和攻击等安全威胁,对于内部人员的疏忽和蓄意造成的泄密基本无能为力。此外,由于防护功能建立在待保护的计算机上,其本身可靠性受现有计算机硬件与操作系统的各种缺陷和漏洞的制约。文章提出了一种具备独立防护系统的安全计算机架构,理论分析和实践表明,该架构能够有效应对外部和内部的安全威胁,保护计算机本身及内部数据信息的安全。 相似文献
20.
随着计算机技术的飞速发展,计算机信息安全问题越来越受关注。各种计算机病毒的泛滥,各种木马猖獗,各种黑客事件曝光等等问题。可以说互联网的计算机都是不安全的,这些计算机可以被网上的任一台计算机攻击,即使不联网,也可能被强行插入的物理设备携带的病毒攻击。如何保护我们计算机的信息安全不被侵犯是我们目前面临的问题。本文介绍了计算机信息安全技术的概要,并详细探讨了目前计算机的各种信息安全防护技术。告诉读者如何才能通过各种方式保护计算机信息,营造一个安全的计算机防护系统。 相似文献