计算机专业英语谢希仁义演示教学.ppt
《计算机专业英语谢希仁义演示教学.ppt》由会员分享,可在线阅读,更多相关《计算机专业英语谢希仁义演示教学.ppt(52页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、计算机专业英语谢希仁义Requirements:1.Principle of easiest penetration2.The kinds of computer security breaches 3.What is firewall4.了解科技论文标题的写法了解科技论文标题的写法 10.1 Secure Networks and PoliciesWhat is a secure network?Can an Internet be made secure?Although the concept of a secure network is appealing to most users,
2、networks cannot be classified simply as secure or not secure because the term is not absoluteeach group defines the level of access that is permitted or denied.怎样才算得上一个安全的网络呢?怎样才能使一个网络变得怎样才算得上一个安全的网络呢?怎样才能使一个网络变得更安全呢?尽管安全网络的概念对大多数用户都很有吸引力,更安全呢?尽管安全网络的概念对大多数用户都很有吸引力,但是网络并不能简单地划分为安全的或是不安全的,因为安但是网络并不能简
3、单地划分为安全的或是不安全的,因为安全本身不是绝对的,每个团体对拒绝或允许访问定义了不同全本身不是绝对的,每个团体对拒绝或允许访问定义了不同的等级。的等级。10.1 Secure Networks and PoliciesFor example,some organizations store data that is valuable.Such organizations define a secure network to be a system prevents outsiders from accessing the organizations computers.Other orga
4、nizations need to make information available to outsiders,but prohibit outsiders from changing the data.Such organizations may define a secure network as one that allows arbitrary access to data,but includes mechanisms that prevent unauthorized changes.比如,有些单位的数据是很有保密价值的,他们就把网络安比如,有些单位的数据是很有保密价值的,他们
5、就把网络安全定义为外界不能访问其计算机;有些单位需要向外界提供全定义为外界不能访问其计算机;有些单位需要向外界提供信息,但禁止外界修改这些信息,他们就把网络安全定义为信息,但禁止外界修改这些信息,他们就把网络安全定义为数据可以被外界任意访问,但不允许未经授权的修改。数据可以被外界任意访问,但不允许未经授权的修改。10.1 Secure Networks and PoliciesStill other groups focus on keeping communication private;they define a secure network as one in which no one
6、other than the intended recipient can intercept and read a message.Finally,many large organizations need a complex definition of security that allows access to selected data or services the organization chooses to make public,while preventing access or modification of sensitive data and services tha
7、t are kept private.有些单位注重通信的隐秘性,他们就把网络安全定义为信息有些单位注重通信的隐秘性,他们就把网络安全定义为信息不可被他人截获或阅读;有些大的组织对安全的定义会更复不可被他人截获或阅读;有些大的组织对安全的定义会更复杂,他们允许外界访问一些公开的数据和服务,同时有些敏杂,他们允许外界访问一些公开的数据和服务,同时有些敏感的数据和服务对外界保密,不允许访问或修改。感的数据和服务对外界保密,不允许访问或修改。10.1 Secure Networks and PoliciesBecause no absolute definition of secure network
8、 exists,the first step an organization must take to achieve a secure system is to define the organizations security policy.The policy does not specify how to achieve protection.Instead,it states clearly and unambiguously the items that are to be protected.正因为安全网络不存在一个绝对的定义,任何组织实现安全正因为安全网络不存在一个绝对的定义,
9、任何组织实现安全系统的第一步就是要制定一个合理的安全策略。该策略不是系统的第一步就是要制定一个合理的安全策略。该策略不是去限定具体的技术实现,而是要清晰地阐明需要保护的各项去限定具体的技术实现,而是要清晰地阐明需要保护的各项条目。条目。10.1 Secure Networks and PoliciesDevising a network security policy can be complex because a rational policy requires an organization to assess the value of information.The policy mu
10、st apply to information stored in computers as well as to information traversing a network.由于制定合理的网络安全策略需要正确评估系统信息的价值,由于制定合理的网络安全策略需要正确评估系统信息的价值,网络安全策略的制定并不是一件容易的事。网络安全策略的制定并不是一件容易的事。(为了对数据进行为了对数据进行有效的保护,有效的保护,)网络安全策略必须能够覆盖数据在计算机网络网络安全策略必须能够覆盖数据在计算机网络系统中存储、传输和处理等各个环节。系统中存储、传输和处理等各个环节。10.2 Aspects of
11、 SecurityDefining a security policy is also complicated because each organization must decide which aspects of protection are most important,and often must compromise between security and ease of use.For example,an organization can consider:制定安全策略的复杂性还体现在必须决定哪个指标是最重要制定安全策略的复杂性还体现在必须决定哪个指标是最重要的,往往必须在
12、安全性和实用性之间采取一个折衷的方案,的,往往必须在安全性和实用性之间采取一个折衷的方案,例如,可以考虑:例如,可以考虑:10.2 Aspects of Security Data Integrity.Integrity refers to protection from change:is the data that arrives at a receiver exactly the same as the data that was sent?数据完整性,即保护数据不被改变,也就是数据在发送前和到达后是否完数据完整性,即保护数据不被改变,也就是数据在发送前和到达后是否完全一样。全一样。Da
13、ta Availability.Availability refers to protection against disruption of service:does data remain accessible for legitimate uses?数据可用性,即在系统故障的情况下数据是否会丢失。数据可用性,即在系统故障的情况下数据是否会丢失。Data Confidentiality and Privacy.Confidentiality and privacy refer to protection against snooping or wiretapping:is data pro
14、tected against unauthorized access?数据保密性,即数据是否会被非法窃取,也就是防止发生未经认可的访问。数据保密性,即数据是否会被非法窃取,也就是防止发生未经认可的访问。10.3 Responsibility and ControlMany organizations discover that they cannot design a security policy because the organization has not specified how responsibility for information is assigned or contr
15、olled.The issue has several aspects to consider:许多组织发现他们无法设计一个安全策略,因为他们还没有许多组织发现他们无法设计一个安全策略,因为他们还没有明确信息控制的职责。这个问题通常可以从两方面来考虑:明确信息控制的职责。这个问题通常可以从两方面来考虑:10.3 Responsibility and ControlAccountability.Accountability refers to how an audit trail is kept:which group is responsible for each item of data?H
16、ow does the group keep records of access and change?帐户。考虑如何规定系统各用户对系统各项信息的访问权限,帐户。考虑如何规定系统各用户对系统各项信息的访问权限,如何监督用户活动、记录用户活动情况等。如何监督用户活动、记录用户活动情况等。Authorization.Authorization refers to responsibility for each item of information and how such responsibility is delegated to other:who is responsible for w
17、here information resides and how does a responsible person approve access and change?授权。对系统内每条信息,考虑如何规定各用户对它的操作授权。对系统内每条信息,考虑如何规定各用户对它的操作权限,如只读、读写以及用户之间的权限转让等。权限,如只读、读写以及用户之间的权限转让等。10.3 Responsibility and ControlThe critical issue underlying both accountability and authorization is control an organi
18、zation must control access to information analogous to the way the organization controls access to physical resources such as offices,equipment,and supplies.不管是帐户管理还是授权管理,关键问题是安全责任控制不管是帐户管理还是授权管理,关键问题是安全责任控制一个组织必须像管理有形资产如办公楼、机器设备一样对信一个组织必须像管理有形资产如办公楼、机器设备一样对信息进行管理。息进行管理。New Words&Expressions:archive
19、 vt.存档;存档;n.档案文件档案文件incur v.招致招致liability n.责任,义务责任,义务 focus on v.集中集中result from v.由由产生产生data integrity 数据完整性数据完整性data availability 数据有效性数据有效性data confidentiality 数据机密性数据机密性accountability n.责任,可计算性责任,可计算性audit trail 审计追踪,检查跟踪审计追踪,检查跟踪authorization n.授权,特许授权,特许integrity mechanisms 完整性机制完整性机制snoop vi
20、.探听,调查,偷窃;探听,调查,偷窃;checksums n.检查机,检验和检查机,检验和cyclic redundancy checks 循环码校验循环码校验wiretap v.n.搭线窃听,窃听或偷录搭线窃听,窃听或偷录 prevent from v.阻止,妨碍阻止,妨碍prohibit from v.禁止,阻止禁止,阻止unauthorized a.未被授权的,未经认可的未被授权的,未经认可的arise from 起于,由起于,由出身出身disruption n.中断,分裂,瓦解,破坏中断,分裂,瓦解,破坏be responsible for v.对对负责负责be analogous t
21、o v.类似于类似于,与,与相似相似malfunctioning n.故障故障be separated from 和和分离开分离开,和和分散分散traverse n.横贯,横断;横贯,横断;vt.横过,穿过,经过横过,穿过,经过appeal to v.呼吁,要求,诉诸,上诉,有吸引力呼吁,要求,诉诸,上诉,有吸引力10.4 Integrity MechanismAbbreviations:CRC(Cyclic Redundancy Check)循环冗余校验法,循环冗余循环冗余校验法,循环冗余核对核对10.4 Integrity Mechanism10.4 Integrity Mechanism
22、Checksums and cyclic redundancy checks(CRC)techniques can be used to ensure the integrity of data against accidental damage.To use such techniques,a sender computes a small,integer value as a function of the data in a packet.The receiver recomputes the function from the data that arrives,and compare
23、s the result to the value that the sender computed.校验和与循环码校验技术可用于在数据意外破坏的情况下保校验和与循环码校验技术可用于在数据意外破坏的情况下保证其完整性。使用这些技术,消息发送方可同时发送一个小证其完整性。使用这些技术,消息发送方可同时发送一个小的整数作为消息的检验值,接收方接到消息时只需重新计算的整数作为消息的检验值,接收方接到消息时只需重新计算一次检验值,并比较两检验值是否相同就可判断该消息是否一次检验值,并比较两检验值是否相同就可判断该消息是否正确了。正确了。10.4 Integrity MechanismA checksu
24、m or CRC cannot absolutely guarantee data integrity for two reasons.First,if malfunctioning hardware changes the value of a checksum as well as the value of the data,it is possible for the altered checksum to be valid for the altered data.Second,if data changes result from a planned attack,the attac
25、ker can create a valid checksum for the altered data.校验和以及循环码校验技术都不能绝对保证数据的完整性,校验和以及循环码校验技术都不能绝对保证数据的完整性,有两个原因:第一,如果由于硬件故障使检验值和消息数据有两个原因:第一,如果由于硬件故障使检验值和消息数据同时被破坏,则可能出现改变后的检验值和消息正巧匹配的同时被破坏,则可能出现改变后的检验值和消息正巧匹配的情况;第二,如果恶意攻击导致数据被改变,攻击者可以为情况;第二,如果恶意攻击导致数据被改变,攻击者可以为改变后的数据产生一个有效的检验值。改变后的数据产生一个有效的检验值。10.5
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机专业 英语 仁义 演示 教学
限制150内