正在加载图片...
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES The major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems. These four threats are shown in Fig. 10-1. 计算机系统的主要资源是硬件、软件和数据。有四种对计算机安 全的威胁:中断,截取,篡改和伪造。这四种威胁都利用了计算 机系统资源的脆弱性,图10-1表示这四种威胁。 《什第机专出美语 10-8Chapter 10 Computer and Network Security 计算机专业英语 10-8 10.1.2 KINDS OF SECURITY BREACHES The major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems.These four threats are shown in Fig.10-1. 计算机系统的主要资源是硬件、软件和数据。有四种对计算机安 全的威胁:中断,截取,篡改和伪造。这四种威胁都利用了计算 机系统资源的脆弱性,图10-1表示这四种威胁。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有