正在加载图片...
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES a human who exploits a vulnerability perpetrates an attack on the system Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters inadvertent human errors and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnera bility. 人可利用脆弱性对系统进行罪恶的攻击。对计算机系统的威胁是引起安 全丧失或伤害的环境;人们的攻击是威胁的例子,如自然灾害,人作非 故意错误和硬件或软件缺陷等。最后,控制是一种保护性措施控制 可以是一种动作,一个设备,一个过程或一种技术减少了脆弱性 《什第机专出美语 10-7Chapter 10 Computer and Network Security 计算机专业英语 10-7 10.1.2 KINDS OF SECURITY BREACHES A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnerability. 人可利用脆弱性对系统进行罪恶的攻击。对计算机系统的威胁是引起安 全丧失或伤害的环境;人们的攻击是威胁的例子,如自然灾害,人们非 故意错误和硬件或软件缺陷等。最后,控制是一种保护性措施——控制 可以是一种动作,一个设备,一个过程或一种技术——减少了脆弱性。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有