麻烦,那位高手帮忙把这段翻译成英语啊~~~~不胜感激啊~~
Authentication解释:身份认证就是对用户身份的证实,用以识别合法或非法的用户并阻止非授权用户访问网络资源身份认证的作用是对用户的身份进行鉴别,是网络安全的重要...
Authentication
解释:
身份认证 就是对用户身份的证实,用以识别合法或非法的用户并阻止非授权用户访问网络资源
身份认证的作用是对用户的身份进行鉴别,是网络安全的重要基础之一。
身份认证作为网络安全中的一种重要技术手段,能够保护网络中的数据和服务不被未授权的用户所访问
身份认证是指计算机及网络系统确认操作者身份的过程。计算机和计算机网络组成了一个虚拟的数字世界.
在数字世界中,一切信息包括用户的身份信息都是由一组特定的数据表示,
计算机只能识别用户的数字身份,给用户的授权也是针对用户数字身份进行的。
而我们生活的现实世界是一个真实的物理世界,每个人都拥有独一无二的物理身份。
如何保证以数字身份进行操作的访问者就是这个数字身份的合法拥有者,
即如何保证操作者的物理身份与数字身份相对应,就成为一个重要的安全问题。
身份认证技术的诞生就是为了解决这个问题
例子:
如果身份认证出现问题 那么用户的个人信息网络信息就得不到保护
比如被他人窃取利用或者发布到互联网 导致个人利益受损
Access control:
解释:
访问控制 就是按用户身份及其所归属的某预定义组来限制用户对某些信息项的访问,或限制对某些控制功能的使用
例子:
如果访问控制出现问题 那么某些不能对用户透露和分享的隐私信息将被公开
任何人都可以浏览 这样就威胁到这些隐私信息的持有人 对他们造成伤害
比如个人博客或空间有些日志和照片访问需要密码 或者隐藏不见
Data Integrity:
解释:
数据完整性 就是指数据的精确性和可靠性以及正确性、相容性、一致性
数据完整性是指存放在数据库中的数据要满足的业务规则,是确保数据库的数据一致、正确以及符合企业规则的一种思想
例子:
如果数据出现错误 那么相应现实中的工作生活也会出现差错
并且数据就不在可靠和精确 对需要这些数据的活动造成影响 展开
解释:
身份认证 就是对用户身份的证实,用以识别合法或非法的用户并阻止非授权用户访问网络资源
身份认证的作用是对用户的身份进行鉴别,是网络安全的重要基础之一。
身份认证作为网络安全中的一种重要技术手段,能够保护网络中的数据和服务不被未授权的用户所访问
身份认证是指计算机及网络系统确认操作者身份的过程。计算机和计算机网络组成了一个虚拟的数字世界.
在数字世界中,一切信息包括用户的身份信息都是由一组特定的数据表示,
计算机只能识别用户的数字身份,给用户的授权也是针对用户数字身份进行的。
而我们生活的现实世界是一个真实的物理世界,每个人都拥有独一无二的物理身份。
如何保证以数字身份进行操作的访问者就是这个数字身份的合法拥有者,
即如何保证操作者的物理身份与数字身份相对应,就成为一个重要的安全问题。
身份认证技术的诞生就是为了解决这个问题
例子:
如果身份认证出现问题 那么用户的个人信息网络信息就得不到保护
比如被他人窃取利用或者发布到互联网 导致个人利益受损
Access control:
解释:
访问控制 就是按用户身份及其所归属的某预定义组来限制用户对某些信息项的访问,或限制对某些控制功能的使用
例子:
如果访问控制出现问题 那么某些不能对用户透露和分享的隐私信息将被公开
任何人都可以浏览 这样就威胁到这些隐私信息的持有人 对他们造成伤害
比如个人博客或空间有些日志和照片访问需要密码 或者隐藏不见
Data Integrity:
解释:
数据完整性 就是指数据的精确性和可靠性以及正确性、相容性、一致性
数据完整性是指存放在数据库中的数据要满足的业务规则,是确保数据库的数据一致、正确以及符合企业规则的一种思想
例子:
如果数据出现错误 那么相应现实中的工作生活也会出现差错
并且数据就不在可靠和精确 对需要这些数据的活动造成影响 展开
1个回答
展开全部
The identity authentication is to prove the identity of the users to identify legal and illegal users and prevent unauthorized users access to network resources
The identity authentication's role is to user's identity undertakes differentiating, is one of the important foundation of network security.
The identity authentication as network security of a kind of important technical means, can protect the network data and services not by unauthorized users have access
The identity authentication refers to computer and network operator's identity confirmation process. Computers and computer networks composed a virtual digital world.
In the digital world, all information, including user identity information are made by a specific group of data representation,
The computer can only to identify users of digital identity, to the user authorization is also based on the user's digital identity.
But we live in the real world is a real physical world, everyone has unique physical status.
How to guarantee in digital identity operate visitors are the digital identity lawful owner,
That is how to guarantee the operator of physical identity and digital identity corresponds, becomes an important issue of security.
The birth of the identity authentication technology is to solve the problem
Example:
If the identity authentication problems so user's personal information network information without protection
For instance by others to steal or publish to the Internet caused by personal interests damaged
Access control:
Explanation:
Access control is to press user identity and the ownership of a predefined group to restrict user access to certain items, or limit the use of certain control function
Example:
If access control problems so some cannot reveal to the privacy of users and share information will be made public
Anyone can browse this threat to these private information holders harmful
Such as personal blog or space some logs and photo visit need password or hidden disappear
Data a:
Explanation:
Data integrity is index according to the accuracy and reliability and validity, compatibility and consistency
Data integrity means stored in database data to meet the business rules, is to ensure that the data from a database is consistent, the correct and conform to the enterprise rules of a kind of thought
Example:
If the data errors correspondingly in reality work life also make mistakes
And the data is not reliable and accurate data for need these activities of the influence
The identity authentication's role is to user's identity undertakes differentiating, is one of the important foundation of network security.
The identity authentication as network security of a kind of important technical means, can protect the network data and services not by unauthorized users have access
The identity authentication refers to computer and network operator's identity confirmation process. Computers and computer networks composed a virtual digital world.
In the digital world, all information, including user identity information are made by a specific group of data representation,
The computer can only to identify users of digital identity, to the user authorization is also based on the user's digital identity.
But we live in the real world is a real physical world, everyone has unique physical status.
How to guarantee in digital identity operate visitors are the digital identity lawful owner,
That is how to guarantee the operator of physical identity and digital identity corresponds, becomes an important issue of security.
The birth of the identity authentication technology is to solve the problem
Example:
If the identity authentication problems so user's personal information network information without protection
For instance by others to steal or publish to the Internet caused by personal interests damaged
Access control:
Explanation:
Access control is to press user identity and the ownership of a predefined group to restrict user access to certain items, or limit the use of certain control function
Example:
If access control problems so some cannot reveal to the privacy of users and share information will be made public
Anyone can browse this threat to these private information holders harmful
Such as personal blog or space some logs and photo visit need password or hidden disappear
Data a:
Explanation:
Data integrity is index according to the accuracy and reliability and validity, compatibility and consistency
Data integrity means stored in database data to meet the business rules, is to ensure that the data from a database is consistent, the correct and conform to the enterprise rules of a kind of thought
Example:
If the data errors correspondingly in reality work life also make mistakes
And the data is not reliable and accurate data for need these activities of the influence
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询