信息与通信工程专业英语.ppt
《信息与通信工程专业英语.ppt》由会员分享,可在线阅读,更多相关《信息与通信工程专业英语.ppt(236页珍藏版)》请在三一办公上搜索。
1、第2篇课文,Part 3 Information Engineering,信 息 工 程,Unit 11 Information SecurityUnit 12 Image ProcessingUnit 13 Multimedia,Unit 11 Information Security,Where Do Security Threats Come from?Imagine you work for an organization.1 You produce goods and/or services.They have value in the marketplace,or you woul
2、d not be doing it.2 Your organization took the risks,did the research,and made the investments.You are entitled to the fruits of your labor.Unfortunately,there is always a human element eager to take advantage of the work done by you and others,yet without the customary quid pro quo:payment for serv
3、ices rendered or for product provided.3,Direct theft of products or services is a simple motivation.More complex is the theft of information for a variety of nefarious purposes:to improve a competitors position;to further a political aim;to deny you timely access to correct information that you need
4、 to survive;to give the perpetrator an ego high.,Security is entirely a people issue.It is people who cause security problems,not machines or systems.Fortunately,our high-technology tools can also serve to thwart people who would do us harm,just the way we lock our doors against intruders.That secur
5、ity is a people problem must be borne in mind as an underlying constant theme in any discussion of security.,Even well-intentioned people are a weak point.Well-meaning people write down passwords or let others use theirs.While we try to use“social engineering”internally to modify behavior so that pe
6、ople will keep security in mind,outsiders try to use the same principle of social engineering to talk users out of passwords.In a sense,they are taking advantage of our incomplete or ineffective social engineering,trying to replace it with their own.,Now we are mentally prepared to begin to think li
7、ke our adversaries.If we can put ourselves in their place,then we can do some role-playing and begin to view our security precautions not just from the inside,but from the outside.Such a dual perspective is essential to effective security management.,What Can people Do to Our Information?They can de
8、stroy:Information Executable programs Operating systems Other computing or system resources Destruction includes both logical damage(to the system involved)and/or physical damage to the equipment itself.More subtle and short of destruction,tampers can alter any of the above,presenting the appearance
9、 of legitimacy though the reality is false.4,They can steal:Information Service Hardware Software Theft includes simply taking information not belonging to them,whether acted on or not.5 It includes the unauthorized use of system resources and is exemplified by the theft of telephone service.6 Theft
10、 plainly includes removal(such as deletion of information)as well as physical transport off the premises.,They can disclose:Information to which they have no right or need Information to unauthorized personnel for other motivations How to let others use resources not intended for outside use They ca
11、n cause service disruptions or interruptions:By causing physical or logical damage to the system By improperly denying access to legitimate users.,It is important to note that motivation is not always relevant.7 Any of the above losses can be caused accidentally.Furthermore,the above can be caused a
12、s of omission(such as failing to do a backup)or commission(such as deliberately causing a malfunction).,Classifying Threat Sources A threat is first classified as originating from outside or inside the organization.From there,we proceed to more specific subcategories:,External threats include:Hacker
13、s Commercial espionage Government-sanctioned espionage Vendors Former employees Internal threats include:Disgruntled employees Unintentional losses or security breaches Hackers,The bulk of the case evidence shows that it is the internal and not the external threat that must concern us the most.Kenne
14、th Weiss,the founder and chairman of Security Dynamics,says that 78 percent of computer abuse originates with a companys own employees.Even so,instances of external interference are growing.,Notes1Imagine you work for an organization.这是一个省略了主语的祈使句,you work for 是imagine 的宾语,引导该从句的that 也被省略掉了。2They ha
15、ve value in the marketplace,or you would not be doing it.此句中的主语They指的是上一句的goods and/or services,而it是指 produce goods and/or services这件事。,3Unfortunately,there is always a human element eager to take advantage of the work done by you and others,yet without the customary quid pro quo1:payment for servic
16、es rendered or for product provided.本句中的to take advantage of是占便宜的意思。而quid pro quo 为拉丁字,意为补偿交换物。,4More subtle and short of destruction,tampers can alter any of the above,presenting the appearance of legitimacy though the reality is false.本句中的short of表示无足够的量,本句为带有现在分词短语及though 引导的让步状语从句的主从复合句。,5Theft
17、includes simply taking information not belonging to them,whether acted on or not.此句中有两个现在分词短语,第一个是taking information,它是谓语动词includes的宾语,而第二个not belonging to 是现在分词短语的否定形式,在句中充当定语,修饰先行词information。,6It includes the unauthorized use of system resources and is exemplified by the theft of telephone servic
18、e.此句中的it指的是theft。7It is important to note that motivation is not always relevant.本句中,it 是形式上的主语,真正的主语是that 引导的一个主语从句,此处的motivation 是指破坏(或作案)的动机。,Grammar Review(一)定语从句1That security is a people problem(that)must be borne in mind as an underlying constant theme in any discussion of security.,(二)宾语从句1K
19、enneth Weiss,the founder and chairman of Security Dynamics,says that 78 percent of computer abuse originates with a companys own employees.,(三)强调句型1It is people who cause security problems,not machines or systems.,(四)短语1More complex is the theft of information for a variety of nefarious purposes:to
20、improve a competitors position;to further a political aim;to deny you timely access to correct information that you need to survive;to give the perpetrator an ego high.2In a sense,they are taking advantage of our incomplete or ineffective social engineering,trying to replace it with their own.3Now w
21、e are mentally prepared to begin to think like our adversaries.,(五)多重复合句1Fortunately,our high-technology tools can also serve to thwart people who would do us harm,just the way we lock our doors against intruders.2While we try to use“social engineering”internally to modify behavior so that people wi
22、ll keep security in mind,outsiders try to use the same principle of social engineering to talk users out of passwords.,3The bulk of the case evidence shows that it is the internal and not the external threat that must concern us the most.4If we can put ourselves in their place,then we can do some ro
23、le-playing and begin to view our security precautions not just from the inside,but from the outside.,Unit 12 Image Processing,1Representation of Images Images can have either digital or analog representation.In the digital representation of gray-level images,the image is presented as a two dimension
24、al array of numbers.Each number represents the intensity or gray level of the image at that relative position.If each gray level is represented as 8 bits(1 byte),then the gray levels are allowed 28 or 256 possible values.These levels are usually assigned integer values ranging from 0 to 255,with 0 r
25、epresenting the darkest intensity level and 255 the brightest intensity level.,Each element in the matrix is called a picture element,which is usually referred to as PEL or pixel.In a color image,the representation is similar,except at each location of the matrix the number represents three primary
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 信息 通信工程 专业 英语
链接地址:https://www.31ppt.com/p-5925534.html