
请帮忙翻译成中文,急!谢谢!!! 20
2.Computersecurityattemptstoensuretheconfidentiality,integrity,andavailabilityofcompu...
2.
Computer security attempts to ensure theconfidentiality , integrity ,and availability of computing systems’ components,Three principal pieces of a computing system are subject to attacks, hardware,software, and data, These three, and the communications among them, constitutethe basis of computer security vulnerabilities. In turn, those people andsystems interested in compromising a system can devise attacks that exploit thevulnerabilities. This chapter has identified four kinds of attacks on computingsystems. Interception, Interruption, modification, and fabrication.
Four principles affect the direction ofwork in computer security. By the principle of easiest penetration, a computingsystem penetrator will use whatever means of attack is the easiest ; therefore,all aspects of computing system security must be considered at once. By theprinciple of timeliness, a system must be protected against penetration only solong as the penetration has value to the penetrator. The principle ofeffectiveness states that controls must be usable and used in order to servetheir purpose. And the weakest link principle states that security is nostronger than its weakest point
Controls can be applied at the levels ofthe data, the programs, the system, the physical devices, the communicationslinks, the environment, and the personnel. Sometimes several controls areneeded to cover a single vulnerability, and sometimes one control addresses manyproblems at once
请人工翻译! 展开
Computer security attempts to ensure theconfidentiality , integrity ,and availability of computing systems’ components,Three principal pieces of a computing system are subject to attacks, hardware,software, and data, These three, and the communications among them, constitutethe basis of computer security vulnerabilities. In turn, those people andsystems interested in compromising a system can devise attacks that exploit thevulnerabilities. This chapter has identified four kinds of attacks on computingsystems. Interception, Interruption, modification, and fabrication.
Four principles affect the direction ofwork in computer security. By the principle of easiest penetration, a computingsystem penetrator will use whatever means of attack is the easiest ; therefore,all aspects of computing system security must be considered at once. By theprinciple of timeliness, a system must be protected against penetration only solong as the penetration has value to the penetrator. The principle ofeffectiveness states that controls must be usable and used in order to servetheir purpose. And the weakest link principle states that security is nostronger than its weakest point
Controls can be applied at the levels ofthe data, the programs, the system, the physical devices, the communicationslinks, the environment, and the personnel. Sometimes several controls areneeded to cover a single vulnerability, and sometimes one control addresses manyproblems at once
请人工翻译! 展开
展开全部
中文翻译如下:计算机安全试图确保机密性,完整性,和可用性的计算系统的组成,计算系统的三个主要部分是受到攻击,硬件,软件,数据,这些三,和它们之间的通信,计算机安全漏洞的构成基础。反过来,这些人和妥协的一个系统可以设计出攻击利用thevulnerabilities感兴趣。本章确定了四种攻击computingsystems。拦截,中断,修改,和制造。
四原则影响计算机安全工作的方向。通过简单的渗透原理,弹一个功能绘算系统将使用任何的攻击手段是容易的;因此,计算系统安全等方面都必须考虑一次。通过分析系统的时效性,必须防止渗透只只要有价值的弹丸穿透。衡量国家控制的原则必须是可用的,用于为目的。与薄弱环节原则指出,安全是nostronger比它最薄弱的环节
控件可以应用在水平的数据,程序,系统,物理设备,该communicationslinks,环境,和人员。有时几个控件所需的盖的一个漏洞,有时候一个问题立刻控制地址
四原则影响计算机安全工作的方向。通过简单的渗透原理,弹一个功能绘算系统将使用任何的攻击手段是容易的;因此,计算系统安全等方面都必须考虑一次。通过分析系统的时效性,必须防止渗透只只要有价值的弹丸穿透。衡量国家控制的原则必须是可用的,用于为目的。与薄弱环节原则指出,安全是nostronger比它最薄弱的环节
控件可以应用在水平的数据,程序,系统,物理设备,该communicationslinks,环境,和人员。有时几个控件所需的盖的一个漏洞,有时候一个问题立刻控制地址
2013-06-16
展开全部
计算机安全试图确保机密性,完整性,和可用性的计算系统的组成,计算系统的三个主要部分是受到攻击,硬件,软件,数据,这些三,和它们之间的通信,计算机安全漏洞的构成基础。反过来,这些人和妥协的一个系统可以利用漏洞发动攻击的能力感兴趣。本章确定了四种对计算机系统的攻击。拦截,中断,修改,和制造。
四原则影响计算机安全工作的方向。通过简单的渗透原理,弹一个功能绘算系统将使用任何的攻击手段是容易的;因此,计算系统安全等方面都必须考虑一次。通过分析系统的时效性,必须防止渗透只只要有价值的弹丸穿透。衡量国家控制的原则必须是可用的,用于为目的。与薄弱环节原则,安全比它最薄弱的环节没有强
控件可以应用在水平的数据,程序,系统,物理设备,通信链路,环境,和人员。有时几个控件所需的盖的一个漏洞,有时候一个问题立刻控制地址
(自己看看对不对,本人英语也就这水平)
四原则影响计算机安全工作的方向。通过简单的渗透原理,弹一个功能绘算系统将使用任何的攻击手段是容易的;因此,计算系统安全等方面都必须考虑一次。通过分析系统的时效性,必须防止渗透只只要有价值的弹丸穿透。衡量国家控制的原则必须是可用的,用于为目的。与薄弱环节原则,安全比它最薄弱的环节没有强
控件可以应用在水平的数据,程序,系统,物理设备,通信链路,环境,和人员。有时几个控件所需的盖的一个漏洞,有时候一个问题立刻控制地址
(自己看看对不对,本人英语也就这水平)
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询