计算机专业英语第10章.ppt
《计算机专业英语第10章.ppt》由会员分享,可在线阅读,更多相关《计算机专业英语第10章.ppt(34页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Computer English Chapter 10 Computer and Network SecurityChapter 10 Computer and Network SecurityKey points:useful terms and definitions of computer securityDifficult points:distinguish between four kinds of computer security breaches2计算机专业英语Chapter 10 Computer and Network SecurityRequirements:1.Pri
2、nciple of easiest penetration 2.The kinds of computer security breaches 3.What is firewall4.了解科技论文标题的写法了解科技论文标题的写法 3计算机专业英语Chapter 10 Computer and Network SecurityNew Words&Expressions:breach breach 破坏,缺口破坏,缺口 involve involve 包含,涉及,也可不译包含,涉及,也可不译depositor depositor 寄托者寄托者vulnerability vulnerability
3、弱点,攻击弱点,攻击perimeter perimeter 周围,周边周围,周边 penetrate penetrate vtvt.攻破,攻击攻破,攻击Exposure Exposure 曝光,揭露曝光,揭露threat n.threat n.威胁,恐吓威胁,恐吓asset asset 资产资产interruption interruption 中断,打断中断,打断interception interception 截取截取modification modification 修改修改fabricate v.fabricate v.伪造伪造tamper v.tamper v.篡改篡改spurio
4、us adj.spurious adj.假的假的 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches Abbreviations:4计算机专业英语Chapter 10 Computer and Network Security 10.1.1 入侵计算机的特点入侵计算机的特点Principle of Easiest Penetration.An intruder must be expected to use any available means of penetration.This will n
5、ot necessarily be the most obvious means,nor will it necessarily be the one against which the most solid defense has been installed.最最容容易易攻攻破破原原理理。入入侵侵者者必必定定要要使使用用一一种种可可以以攻攻破破的的方方法法,这这种种方方法法既既不不可能是最常用的,也不可能是针对已经采取了最可靠的防范措施的方法。可能是最常用的,也不可能是针对已经采取了最可靠的防范措施的方法。This principle says that computer security
6、 specialists must consider all possible means of penetration,because strengthening one may just make another means more appealing to intruders.We now consider what these means of penetration are.这这一一原原理理说说明明计计算算机机安安全全专专家家必必须须考考虑虑所所有有可可能能的的攻攻击击方方法法。由由于于你你加加强强了了某某一一方方面面,入入侵侵者者可可能能会会想想出出另另外外的的对对付付方方法法。
7、我我们们现现在在就就说说明明这这些些攻攻击的方法是什么。击的方法是什么。10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches5计算机专业英语Chapter 10 Computer and Network Security10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches10.1.2 KINDS OF SECURITY BREACHESIn security,an exposure is a form of
8、possible loss or harm in a computing system;examples of exposures are unauthorized disclosure of data,modification of data,or denial of legitimate access to computing.A vulnerability is a weakness in the security system that might be exploited to cause loss or harm.在在计计算算机机系系统统中中,暴暴露露是是一一种种使使安安全全完完全
9、全丧丧失失或或受受到到伤伤害害的的一一种种形形式式;暴暴露露的的例例子子是是非非授授权权的的数数据据公公开开、数数据据修修改改或或拒拒绝绝合合法法的的访访问问计计算算机机。脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。6计算机专业英语Chapter 10 Computer and Network Security10.1.2 KINDS OF SECURITY BREACHESA human who exploits a vulnerability perpetrates an attack on the system.Th
10、reats to computing systems are circumstances that have the potential to cause loss or harm;human attacks are examples of threats,as are natural disasters,inadvertent human errors,and internal hardware or software flaws.Finally,a control is a protective measure-an action,a device,a procedure,or a tec
11、hnique-that reduces a vulnerability.人人可可利利用用脆脆弱弱性性对对系系统统进进行行罪罪恶恶的的攻攻击击。对对计计算算机机系系统统的的威威胁胁是是引引起起安安全全丧丧失失或或伤伤害害的的环环境境;人人们们的的攻攻击击是是威威胁胁的的例例子子,如如自自然然灾灾害害,人人们们非非故故意意错错误误和和硬硬件件或或软软件件缺缺陷陷等等。最最后后,控控制制是是一一种种保保护护性性措措施施控控制制可以是一种动作,一个设备,一个过程或一种技术可以是一种动作,一个设备,一个过程或一种技术减少了脆弱性。减少了脆弱性。10.1 Characteristics of Comput
12、er Intrusion and Kinds of Security Breaches7计算机专业英语Chapter 10 Computer and Network Security10.1.2 KINDS OF SECURITY BREACHES The major assets of computing systems are hardware,software,and data.There are four kinds of threats to the security of a computing system:interruption,interception,modificati
13、on,and fabrication.The four threats all exploit vulnerabilities of the assets in computing systems.These four threats are shown in Fig.10-1.计计算算机机系系统统的的主主要要资资源源是是硬硬件件、软软件件和和数数据据。有有四四种种对对计计算算机机安安全全的的威威胁胁:中中断断,截截取取,篡篡改改和和伪伪造造。这这四四种种威威胁胁都都利利用用了了计计算算机系统资源的脆弱性,图机系统资源的脆弱性,图10-110-1表示这四种威胁。表示这四种威胁。10.1 Cha
14、racteristics of Computer Intrusion and Kinds of Security Breaches8计算机专业英语Chapter 10 Computer and Network SecurityFig.10-1 Four classes of System Security FailuresFour classes of System Security Failures9计算机专业英语Chapter 10 Computer and Network Security10.1.2 KINDS OF SECURITY BREACHES(1)In an interrup
15、tion,an asset of the system becomes lost or unavailable or unusable.An example is malicious destruction of a hardware device,erasure of a program or data file,or failure of an operating system file manager so that it cannot find a particular disk file.(2)(2)(1)(1)在在中中断断情情况况下下,系系统统资资源源开开始始丢丢失失,不不可可用用
16、或或不不能能用用。例例如如,蓄蓄意意破破坏坏硬硬件件设设备备,抹抹除除程程序序或或数数据据文文件件或或造造成成操操作作系统的文件管理程序故障,以致不能找到某一磁盘文件。系统的文件管理程序故障,以致不能找到某一磁盘文件。10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches10计算机专业英语Chapter 10 Computer and Network Security10.1.2 KINDS OF SECURITY BREACHES(2)An interception means that some u
17、nauthorized party has gained access to an asset.The outside party can be a person,a program,or a computing system.Examples of this type of failure are illicit copying of program or data files,or wiretapping to obtain data in a network.While a loss may be discovered fairly quickly,a silent intercepto
18、r may leave no traces by which the interception can be readily detected.(2)(2)截截取取是是指指某某一一非非特特许许用用户户掌掌握握了了访访问问资资源源的的权权利利。外外界界用用户户可可以以是是一一个个人人、一一个个程程序序或或一一个个计计算算机机系系统统。这这种种威威胁胁的的例例子子如如程程序序或或数数据据文文件件的的非非法法拷拷贝贝,或或私私自自接接线线入入网网去去获获取取数数据据。数数据据丢丢失失可可能能会会很很快快被被发发现现,但很可能截取者并不留下任何容易检测的痕迹但很可能截取者并不留下任何容易检测的痕迹。1
19、0.1 Characteristics of Computer Intrusion and Kinds of Security Breaches11计算机专业英语Chapter 10 Computer and Network Security10.1.2 KINDS OF SECURITY BREACHES(3)If an unauthorized party not only accesses but tampers with an asset,the failure becomes a modification.For example,someone might modify the va
20、lues in a database,alter a program so that it performs an additional computation,or modify data being transmitted electronically.It is even possible for hardware to be modified.Some cases of modification can be detected with simple measures,while other more subtle changes may be almost impossible to
21、 detect.(3)(3)如果非授权用户不仅可以访问计算机资源,而且可以篡改资源,则威如果非授权用户不仅可以访问计算机资源,而且可以篡改资源,则威胁就成为胁就成为修改修改了。例如,某人可以修改数据库中的值,了。例如,某人可以修改数据库中的值,更换一个程序,更换一个程序,以便完成另外的计算,或修改正在传送的数据,以便完成另外的计算,或修改正在传送的数据,甚至还甚至还 可能修改硬件。可能修改硬件。某些情况下可以用简单的测量手段检测某些情况下可以用简单的测量手段检测出所做的修改,但某些微妙的出所做的修改,但某些微妙的修改是不可能检测出来的。修改是不可能检测出来的。10.1 Characterist
22、ics of Computer Intrusion and Kinds of Security Breaches12计算机专业英语Chapter 10 Computer and Network Security10.1.2 KINDS OF SECURITY BREACHES(4)Finally,an unauthorized party might fabricate counterfeit objects for a computing system.The intruder may wish to add spurious transactions to a network commun
23、ication system.or add records to an existing data base.Sometimes these additions can be detected as forgeries,but if skillfully done,they are virtually indistinguishable from the real thing.(4)(4)最最后后,非非授授权权用用户户可可以以伪伪造造计计算算机机系系统统的的一一些些对对象象。入入侵侵者者妄妄图图向向网网络络通通信信系系统统加加入入一一个个假假的的事事务务处处理理业业务务,或或向向现现有有的的数
24、数据据库库加加入入记记录录。有有时时,这这些些增增加加的的数数据据可可以以作作为为伪伪造造品品检检测测出出来来,但如果做得很巧妙,这些数据实际上无法与真正的数据分开。但如果做得很巧妙,这些数据实际上无法与真正的数据分开。10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches13计算机专业英语Chapter 10 Computer and Network Security10.1 Characteristics of Computer Intrusion and Kinds of Security Bre
25、aches10.1.2 KINDS OF SECURITY BREACHESThese four classes of interference with computer activity-interruption,interception,modification,and fabrication-can describe the kinds of exposures possible2.这这四四种种对对计计算算机机工工作作的的干干扰扰中中断断,截截取取,修修改改或或伪伪造造表明了可能出现的几种威胁类型。表明了可能出现的几种威胁类型。14计算机专业英语Chapter 10 Computer
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机专业 英语 10
限制150内