首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
数据备份已成为数据安全程度的一个重要衡量指标。为了保证数据的安全性,必须对数据进行可靠的备份,选择专门的备份软件、硬件并且制定完善的备份策略来保证数据的高可用性。文章重点论述了数据备份的重要性、数据备份的技术分类以及我公司现有的存储备份系统,并以数据库、备份软件为例分析实现备份策略。  相似文献   

2.
针对我国中继卫星系统组网备份策略问题,在分析国外中继卫星系统有关情况,尤其是美国中继卫星系统组网备份策略的基础上,讨论了我国中继卫星系统组网备份的途径,针对我国实际情况提出了目前宜采用发射备份星进行备份的策略,后续应考虑具备轨位漂移能力实现系统重构的备份策略。分析了我国组网备份的技术能力,研究了轨位漂移、多星共位控制和规划调整等技术手段,提出了为具备漂移能力而带来的技术问题及其解决途径,并指出了后续研究的方向。  相似文献   

3.
介绍了传统的备份导航仪表及综合备份导航显示系统的组成及原理,分析了备份导航仪表存在的问题,并阐述了综合备份导航显示系统的优点及特点,为高级教练机的应用奠定了基础。  相似文献   

4.
随着我国中继卫星系统的不断建设与发展,如何完善系统的组网运行管理,构建一个高可靠性和高可用度的系统是摆在我们面前的重要课题。在对美国TDRSS(跟踪与数据中继卫星系统)的卫星在轨备份、轨道漂移、卫星共位、地面终端站配置以及系统总体性能等方面进行分析的基础上,总结出其组网运行的4个特点:空间段具有备份节点、备份星;地面段配置备份中心、备份站;系统具备2颗卫星共位能力;系统具备轨道漂移能力。结合我国中继卫星系统建设与发展实际,得出了以下几点启示:加快备份星和备份站的部署与建设;适时形成单节点多星的星群配置;增加支持卫星轨道漂移和共位的能力;增加大椭圆轨道卫星的部署。  相似文献   

5.
针对采用两种通信总线作为主要通信的复杂航电系统,通过研究其体系结构,利用故障树对系统可能故障进行分析,优化了单总线通信系统中主备机表决算法,设计了一种双总线通信系统中主备机的同步和双机切换机制,提升了双机切换的性能,实现了系统故障时的平滑切换运行,提高了双机切换的实时性和双机备份系统的可靠性。  相似文献   

6.
针对某型惯导系统在修理过程中出现备份机夺权故障,进行备份机故障分析研究。通过对备份机夺权原理的分析以及对故障芯片进行X射线电子线路分析研究,实现了故障定位与排除,最后总结了备份机故障性质、原因与相应措施,有效降低了备份机故障率,提高了装备的使用可靠性。  相似文献   

7.
在容灾系统数据中心和备份中心分别设计了事件驱动型状态机;备份中心启用日志卷,保证了DCM操作中系统数据的一致性不被破坏;采用循环DCM,提高系统的响应速度。基于该机制的状态机可以保证状态转换的正确性,降低系统的复杂度,有效地维护数据的一致性和系统的高可用性。  相似文献   

8.
针对我国某大型飞机飞控系统机械备份钢索传动组件在装配过程的瓶颈问题,就设计原理、工艺方法等进行讨论和研究,找出了问题产生的根本原因,提出了机械备份系统钢索传统组件装配解决方案。  相似文献   

9.
顾隶华 《红旗技术》2005,(4):23-26,33
在计算机日益普及、数字化日益发展的信息时代,计算机数据已经成为一个国家、部门、企业乃至个人的重要财产。由于各种人为或自然等不确定因素的存在,计算机数据随时都有可能损坏或丢失,为保证这些数据的安全,必须采取必要的安全防护和备份措施。本文结合西航集团公司具体情况,介绍了为保证数据安全,如何进行计算机安全管理和实现数据备份以及数据恢复几种方法。  相似文献   

10.
对迎角传感器加温电路的组成和工作原理进行了阐述,解释了"侧向通道无备份"的种类和含义。结合电传系统安装架加温控制逻辑电路,整理和总结了电传系统工作状态与迎角传感器加温状态之间的逻辑关系,进一步分析了由风标加温引起的"侧向通道无备份"故障机理。  相似文献   

11.
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification.  相似文献   

12.
我国社会保障基金的制度缺陷及其对策   总被引:3,自引:0,他引:3  
社会保障基金的筹集和使用具有调节宏观经济的财政效应,但目前我国社保基金的制度缺陷使其对宏观经济的调节作用受到了很大制约。只有多元化筹集社会保障基金,突破原有投资格局的限制,才能消除社会保障基金的制度缺陷,发挥其财政效应。  相似文献   

13.
在远程网络环境下,由多个分散数据库组成的管理信息系统在当前十分普及,如何采用最小代价将分散数据库整合成准分布式数据库系统是一个迫切需要解决的问题。Oracle的分布式数据库功能允许用户将多个站点上的数据库作为一个逻辑上的整体,数据一致性、完整性及安全性都得以实现。在阐述了如何使用Oracle建立分布式数据库基础上,提出了解决数据复制问题的方法。实践证明,Oracle可以提供完备的方案建立分布式数据库。  相似文献   

14.
PKI在远程故障诊断系统中的应用研究   总被引:1,自引:0,他引:1  
介绍了网络安全在远程故障诊断信息化系统中的项目背景,对系统涉及的敏感数据业务环节的信息安全,保密技术进行了分析。系统运用VPN的专用性,建立起安全的网络通路,同时运用PKI/CA,增强了系统安全的可控性,保证系统的整体运行性能,为企事业单位的远程故障诊断提供了一个成功的解决方案。  相似文献   

15.
The importance of considering computer security as part of the software quality assurance practice is discussed. Issues that point to the need for integration of quality assurance and computer security disciplines are raised. To address some of these issues, the NASA Automated Information Security (AIS) program is presented as a model that may be used for improving interactions between the quality assurance and computer security community of professionals. The information presented does not comprise an answer to documenting all computer security interactions with quality assurance, but it does present a currently working baseline model and can serve as a basis for future research and discussion  相似文献   

16.
平台本体的可靠性评估是用来验证其抽样数据是否符合其指标要求的一种方法。本文就平台本体的可靠性指标验证问题,进行了威布尔寿命型产品可靠性的讨论,阐述了新的可靠性评估方法的理论推导,它对比原始的可靠性评估方法更加准确和充分。最后将其应用在某型号平台本体的可靠性试验数据上并计算出结果,能够验证该平台本体满足控制系统的指标要求。  相似文献   

17.
Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to corporate networks. Several researchers are looking at the possibility of the existence of a total of three networks: passenger network (PN); crew network (CRN); and the control network (CON). Researchers envision an architecture where these three networks will co-exist in an airplane. The available Internet connectivity can be utilized for transporting flight critical information like cockpit flight data recorder (CFDR) data, digital flight data recorder (DFDR) data, cockpit voice recorder (CVR) data, and controller pilot data link communication. In addition, the Internet connectivity could also be used for other safety mechanisms like video surveillance and remote control of the flight. Security is one of the major concerns that affect the successful deployment of aircraft data networks (ADN) and other safety features. Several studies have been carried out to secure the network using firewalls and intrusion detection system but so far no study has focused on securing the communication channel (between the aircraft and the ground station) and its impact on the ADN. The scope of this research is to determine the viability and need of a security mechanism. The research also focuses on the performance of different security architectures and determine their usability in the framework of an ADN.  相似文献   

18.
存储在数据库中的数据必须具有安全保证.为此,DBMS提供了安全管理技术.安全性策略是DBMS实现安全管理的基本技术.文章较详细地介绍了Oracle 9i数据库管理系统的安全管理技术中的安全性策略.这些策略涉及系统安全性策略、数据安全性策略和用户安全性策略.进一步地介绍了数据库验证、外部验证、企业验证和并发许可等用户验证和许可限制.上述安全技术构成了Oracle 9i数据库安全管理技术的基础,也是DBA必须掌握的基本技术.文章最后给出Oracle 9i安全策略的优点.  相似文献   

19.
化学法处理大批量导弹液体推进剂废液废水   总被引:2,自引:0,他引:2  
通过对导弹液体推进剂废液废水的组成和化学性质的分析,确定废液废水的处理方法。根据化学反应和实验结果确定处理剂的用量,分别对氧化剂和燃料废液废水的处理工艺进行了设计,并提出了防止大气污染、安全快速的有效处理措施。  相似文献   

20.
On measurement of operational security   总被引:1,自引:0,他引:1  
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of “the ability of the system to resist attack.” That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit “more secure behavior” in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behavior will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working toward measures of “operational security” similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches, or the probability that a specified “mission” can be accomplished without a security breach. This new approach is based on the analogy between system failure and security breach, but it raises several issues which invite empirical investigation. We briefly describe a pilot experiment that we have conducted to judge the feasibility of collecting data to examine these issues  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号