The security requirements that you verify during routine system auditing should be the same requirements and security principles that guide the system installation.
例程系统审计过程中需要验证的安全性需求应该与系统安装过程中使用的需求和安全性准则相同。
2
With routineauditing, vulnerabilities in the network can also be quickly uncovered.