计算机专业英语第10章.ppt
《计算机专业英语第10章.ppt》由会员分享,可在线阅读,更多相关《计算机专业英语第10章.ppt(34页珍藏版)》请在三一办公上搜索。
1、Computer English,Chapter 10 Computer and Network Security,计算机专业英语,10-2,Key points:useful terms and definitions of computer securityDifficult points:distinguish between four kinds of computer security breaches,计算机专业英语,10-3,Requirements:,1.Principle of easiest penetration,2.The kinds of computer secur
2、ity breaches,3.What is firewall,4.了解科技论文标题的写法,计算机专业英语,10-4,New Words&Expressions:breach 破坏,缺口 involve 包含,涉及,也可不译depositor 寄托者vulnerability 弱点,攻击perimeter 周围,周边 penetrate vt.攻破,攻击Exposure 曝光,揭露threat n.威胁,恐吓asset 资产interruption 中断,打断interception 截取modification 修改fabricate v.伪造tamper v.篡改spurious adj.
3、假的,10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches,Abbreviations:,计算机专业英语,10-5,10.1.1 入侵计算机的特点Principle of Easiest Penetration.An intruder must be expected to use any available means of penetration.This will not necessarily be the most obvious means,nor will it necessarily
4、be the one against which the most solid defense has been installed.最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不可能是最常用的,也不可能是针对已经采取了最可靠的防范措施的方法。This principle says that computer security specialists must consider all possible means of penetration,because strengthening one may just make another means more appeali
5、ng to intruders.We now consider what these means of penetration are.这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻击的方法是什么。,10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches,计算机专业英语,10-6,10.1 Characteristics of Computer Intrusion and Kinds of Security Breache
6、s,10.1.2 KINDS OF SECURITY BREACHESIn security,an exposure is a form of possible loss or harm in a computing system;examples of exposures are unauthorized disclosure of data,modification of data,or denial of legitimate access to computing.A vulnerability is a weakness in the security system that mig
7、ht be exploited to cause loss or harm.在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式;暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机。脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。,计算机专业英语,10-7,10.1.2 KINDS OF SECURITY BREACHESA human who exploits a vulnerability perpetrates an attack on the system.Threats to computing systems are circumstances that
8、 have the potential to cause loss or harm;human attacks are examples of threats,as are natural disasters,inadvertent human errors,and internal hardware or software flaws.Finally,a control is a protective measure-an action,a device,a procedure,or a technique-that reduces a vulnerability.人可利用脆弱性对系统进行罪
9、恶的攻击。对计算机系统的威胁是引起安全丧失或伤害的环境;人们的攻击是威胁的例子,如自然灾害,人们非故意错误和硬件或软件缺陷等。最后,控制是一种保护性措施控制可以是一种动作,一个设备,一个过程或一种技术减少了脆弱性。,10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches,计算机专业英语,10-8,10.1.2 KINDS OF SECURITY BREACHES The major assets of computing systems are hardware,software,and data.Th
10、ere are four kinds of threats to the security of a computing system:interruption,interception,modification,and fabrication.The four threats all exploit vulnerabilities of the assets in computing systems.These four threats are shown in Fig.10-1.计算机系统的主要资源是硬件、软件和数据。有四种对计算机安全的威胁:中断,截取,篡改和伪造。这四种威胁都利用了计算
11、机系统资源的脆弱性,图10-1表示这四种威胁。,10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches,计算机专业英语,10-9,Fig.10-1 Four classes of System Security Failures,计算机专业英语,10-10,10.1.2 KINDS OF SECURITY BREACHESIn an interruption,an asset of the system becomes lost or unavailable or unusable.An example
12、 is malicious destruction of a hardware device,erasure of a program or data file,or failure of an operating system file manager so that it cannot find a particular disk file.(1)在中断情况下,系统资源开始丢失,不可用或不能用。例如,蓄意破坏硬件设备,抹除程序或数据文件或造成操作系统的文件管理程序故障,以致不能找到某一磁盘文件。,10.1 Characteristics of Computer Intrusion and
13、Kinds of Security Breaches,计算机专业英语,10-11,10.1.2 KINDS OF SECURITY BREACHES(2)An interception means that some unauthorized party has gained access to an asset.The outside party can be a person,a program,or a computing system.Examples of this type of failure are illicit copying of program or data file
14、s,or wiretapping to obtain data in a network.While a loss may be discovered fairly quickly,a silent interceptor may leave no traces by which the interception can be readily detected.(2)截取是指某一非特许用户掌握了访问资源的权利。外界用户可以是一个人、一个程序或一个计算机系统。这种威胁的例子如程序或数据文件的非法拷贝,或私自接线入网去获取数据。数据丢失可能会很快被发现,但很可能截取者并不留下任何容易检测的痕迹。,
15、10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches,计算机专业英语,10-12,10.1.2 KINDS OF SECURITY BREACHES(3)If an unauthorized party not only accesses but tampers with an asset,the failure becomes a modification.For example,someone might modify the values in a database,alter a progra
16、m so that it performs an additional computation,or modify data being transmitted electronically.It is even possible for hardware to be modified.Some cases of modification can be detected with simple measures,while other more subtle changes may be almost impossible to detect.(3)如果非授权用户不仅可以访问计算机资源,而且可
17、以篡改资源,则威胁就成为修改了。例如,某人可以修改数据库中的值,更换一个程序,以便完成另外的计算,或修改正在传送的数据,甚至还可能修改硬件。某些情况下可以用简单的测量手段检测出所做的修改,但某些微妙的修改是不可能检测出来的。,10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches,计算机专业英语,10-13,10.1.2 KINDS OF SECURITY BREACHES(4)Finally,an unauthorized party might fabricate counterfeit objec
18、ts for a computing system.The intruder may wish to add spurious transactions to a network communication system.or add records to an existing data base.Sometimes these additions can be detected as forgeries,but if skillfully done,they are virtually indistinguishable from the real thing.(4)最后,非授权用户可以伪
19、造计算机系统的一些对象。入侵者妄图向网络通信系统加入一个假的事务处理业务,或向现有的数据库加入记录。有时,这些增加的数据可以作为伪造品检测出来,但如果做得很巧妙,这些数据实际上无法与真正的数据分开。,10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches,计算机专业英语,10-14,10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches,10.1.2 KINDS OF SECURITY BREACHESThese
20、 four classes of interference with computer activity-interruption,interception,modification,and fabrication-can describe the kinds of exposures possible2.这四种对计算机工作的干扰中断,截取,修改或伪造表明了可能出现的几种威胁类型。,计算机专业英语,10-15,New Words&Expressions:cryptography n.密码学encryption 加密 cipher n.密码(钥),加密程序decrypt v.解密transit
21、通行(过),运输plaintext n.明文cyphertext n.密文scheme n.计划,方案secret-key 秘钥public-key 公钥symmetric adj.对称的data integrity 数据完整性session key 会话密钥crack v.解开,裂开hacker 黑客,计算机窃贼encode v.编码triple-encryption 三重加密built-in 内在(固有)的,state-of-the-art 最新的proliferate v.增生,扩散,10.2 Modern Cryptography-Data Encryption,Abbreviatio
22、ns:DES(Data Encryption System)数据加密系统DCE(Distributed Computing Environment)分布式计算环境,计算机专业英语,10-16,10.2 Modern Cryptography-Data Encryption,If the receiver of the encrypted data wants to read the original data,the receiver must convert it back to the original through a process called decryption.Decrypt
23、ion is the inverse of the encryption process.In order to perform the decryption,the receiver must be in possession of a special piece of data called the key.如果接收到加密数据的人要看原来的数据,就必须把数据转换为原来的形式,这个过程称为解密。解密是加密过程的逆过程。为了进行解密,接收者必须有称为密钥的特殊数据。The two main competing cryptography schemes are known as the secr
24、et-key(symmetric)system and the public-key(asymmetric)system.The secret-key system uses a single,wholly secret sequence both to encrypt and to decrypt messages.The public-key system uses a pair of mathematically related sequences,one each for encryption and decryption 1.现在有两种主要的、相互竞争的密码术:秘钥(对称)和公钥(不
25、对称)系统。秘钥系统采用单一的绝密序列,对报文进行加密和解密。公钥系统采用一对数学上相关的序列,一个用于加密,另一个用于解密。,计算机专业英语,10-17,10.2 Modern Cryptography-Data Encryption,Secret-key encryptionOne of the most popular secret-key encryption schemes is IBMs Data Encryption System(DES),which became the U.S.federal standard in 1997.the standard form uses a
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机专业 英语 10
![提示](https://www.31ppt.com/images/bang_tan.gif)
链接地址:https://www.31ppt.com/p-6342243.html