当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

《计算机专业英语 Computer English》课程教学资源(PPT课件讲稿,双语版)Chapter 10 Computer and Network Security

资源类别:文库,文档格式:PPT,文档页数:34,文件大小:238KB,团购合买
1. Principle of easiest penetration 2. The kinds of computer security breaches 3. What is firewall 4. 了解科技论文标题的写法
点击下载完整版文档(PPT)

s Computer English Chapter 10 Computer and Network Security

Computer English Chapter 10 Computer and Network Security

2 Chapter 10. Computer and Network Security Key points useful terms and definitions of computer security Difficult points distinguish between four kinds of computer security breaches 《什第机专出美语 10-2

Chapter 10 Computer and Network Security 计算机专业英语 10-2 Key points: useful terms and definitions of computer security Difficult points: distinguish between four kinds of computer security breaches

2 Chapter 10. Computer and Network Security Requirements: 1. Principle of easiest penetration 2. The kinds of computer security breaches 3. What is firewall 4.了解科技论文标题的写法 《什第机专出美语 103

Chapter 10 Computer and Network Security 计算机专业英语 10-3 Requirements: 1. Principle of easiest penetration 2. The kinds of computer security breaches 3. What is firewall 4. 了解科技论文标题的写法

Chapter 10. Computer and Network Security 10. 1 Characteristics of Computer Intrusion and Kinds of Security Breaches New Words Expressions breach破坏,缺口 involve包含,涉及,也可不译 depositor寄托者 vulnerability弱点,攻击 perimeter周围,周边 penetrate vt.攻破,攻击 Exposure曝光,揭露 threat n.威胁,恐吓 asset资产 interruption中断,打断 interception截取 modification修改 fabricate v.伪造 tamper 篡改 spurious adj.假的 Abbreviations: 计算机专业英语 104

Chapter 10 Computer and Network Security 计算机专业英语 10-4 New Words & Expressions: breach 破坏,缺口 involve 包含,涉及,也可不译 depositor 寄托者 vulnerability 弱点,攻击 perimeter 周围,周边 penetrate vt. 攻破,攻击 Exposure 曝光,揭露 threat n. 威胁,恐吓 asset 资产 interruption 中断,打断 interception 截取 modification 修改 fabricate v. 伪造 tamper v. 篡改 spurious adj. 假的 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches Abbreviations:

Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.1入侵计算机的特点 Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed 最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不 可能是最常用的,也不可能是针对己经釆取了最可靠的防范措施的方法。 This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are 这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强 了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻 击的方法是什么。和解 10-5

Chapter 10 Computer and Network Security 计算机专业英语 10-5 10.1.1 入侵计算机的特点 Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed. 最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不 可能是最常用的,也不可能是针对已经采取了最可靠的防范措施的方法。 This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are. 这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强 了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻 击的方法是什么。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches

Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of security breaches 10.1.2 KINDS OF SECURITY BREACHES In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data. modification of data. or denial of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm 在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式; 暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机 脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。 《什第机专出美语 10-6

Chapter 10 Computer and Network Security 计算机专业英语 10-6 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or denial of legitimate access to computing . A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. 在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式; 暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机。 脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害

Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES a human who exploits a vulnerability perpetrates an attack on the system Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters inadvertent human errors and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnera bility. 人可利用脆弱性对系统进行罪恶的攻击。对计算机系统的威胁是引起安 全丧失或伤害的环境;人们的攻击是威胁的例子,如自然灾害,人作非 故意错误和硬件或软件缺陷等。最后,控制是一种保护性措施控制 可以是一种动作,一个设备,一个过程或一种技术减少了脆弱性 《什第机专出美语 10-7

Chapter 10 Computer and Network Security 计算机专业英语 10-7 10.1.2 KINDS OF SECURITY BREACHES A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnerability. 人可利用脆弱性对系统进行罪恶的攻击。对计算机系统的威胁是引起安 全丧失或伤害的环境;人们的攻击是威胁的例子,如自然灾害,人们非 故意错误和硬件或软件缺陷等。最后,控制是一种保护性措施——控制 可以是一种动作,一个设备,一个过程或一种技术——减少了脆弱性。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches

Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES The major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems. These four threats are shown in Fig. 10-1. 计算机系统的主要资源是硬件、软件和数据。有四种对计算机安 全的威胁:中断,截取,篡改和伪造。这四种威胁都利用了计算 机系统资源的脆弱性,图10-1表示这四种威胁。 《什第机专出美语 10-8

Chapter 10 Computer and Network Security 计算机专业英语 10-8 10.1.2 KINDS OF SECURITY BREACHES The major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems.These four threats are shown in Fig.10-1. 计算机系统的主要资源是硬件、软件和数据。有四种对计算机安 全的威胁:中断,截取,篡改和伪造。这四种威胁都利用了计算 机系统资源的脆弱性,图10-1表示这四种威胁。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches

Chapter 10. Computer and Network Security Normal flow Interruption Interception Fabrication Modification Fig 10-1 Four classes of System Security Failures 《什第机专出美语 10-9

Chapter 10 Computer and Network Security 计算机专业英语 10-9 Fabrication Modification Normal Flow Interruption Interception Fig.10-1 Four classes of System Security Failures

Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES (1) In an interruption, an asset of the system becomes lost or unavaila ble or unusa ble An example is malicious destruction of a hardware device, erasure of a program or data file, or failure of an operating system file manager so that it cannot find a particular disk file. 1)在中断情况下,系统资源开始丢失,不可用或不能用。例 如,蓄意破坏硬件设,抹除程序或数据文件或造成操作系 统的文件管理程序故障,以致不能找到某磁盘文件。 《什第机专出美语 0-10

Chapter 10 Computer and Network Security 计算机专业英语 10-10 10.1.2 KINDS OF SECURITY BREACHES (1) In an interruption, an asset of the system becomes lost or unavailable or unusable. An example is malicious destruction of a hardware device, erasure of a program or data file, or failure of an operating system file manager so that it cannot find a particular disk file. (1)在中断情况下,系统资源开始丢失,不可用或不能用。例 如,蓄意破坏硬件设备,抹除程序或数据文件或造成操作系 统的文件管理程序故障,以致不能找到某一磁盘文件。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches

点击下载完整版文档(PPT)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共34页,可试读12页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有