请您帮我翻译为中文,不要用软件翻译,不通顺,谢谢! 20

2.Computersecurityattemptstoensuretheconfidentiality,integrity,andavailabilityofcompu... 2.
Computer security attempts to ensure theconfidentiality , integrity ,and availability of computing systems’ components,Three principal pieces of a computing system are subject to attacks, hardware,software, and data, These three, and the communications among them, constitutethe basis of computer security vulnerabilities. In turn, those people andsystems interested in compromising a system can devise attacks that exploit thevulnerabilities. This chapter has identified four kinds of attacks on computingsystems. Interception, Interruption, modification, and fabrication.
Four principles affect the direction ofwork in computer security. By the principle of easiest penetration, a computingsystem penetrator will use whatever means of attack is the easiest ; therefore,all aspects of computing system security must be considered at once. By theprinciple of timeliness, a system must be protected against penetration only solong as the penetration has value to the penetrator. The principle ofeffectiveness states that controls must be usable and used in order to servetheir purpose. And the weakest link principle states that security is nostronger than its weakest point
Controls can be applied at the levels ofthe data, the programs, the system, the physical devices, the communicationslinks, the environment, and the personnel. Sometimes several controls areneeded to cover a single vulnerability, and sometimes one control addressesmany problems at once
展开
 我来答
飞快烦恼
2013-06-17 · TA获得超过262个赞
知道答主
回答量:245
采纳率:0%
帮助的人:21.8万
展开全部
试图确保计算机安全计算系统组件的的theconfidentiality性,完整性和可用性,计算系统的三项主要受攻击,硬件,软件和数据,这三个,它们之间的通信,基础constitutethe计算机安全漏洞。反过来,这些人andsystems感兴趣危及系统可以制定攻击利用thevulnerabilities。本章已经确定了4种攻击computingsystems的。截取,中断,修改和制作。
四原则影响计算机安全方向ofwork。最容易渗透的原则,computingsystem穿甲弹将使用任何攻击手段是最简单的,因此,各方面的计算系统的安全性,必须考虑一次。按总要求的时效性,系统必须受到保护,防止渗透,只SOLONG的渗透具有价值的穿甲弹。的原则的ofeffectiveness状态的控制必须是可以使用的和使用在为了至servetheir的目的。和最薄弱的环节原则指出,安全性比其最弱的点
控制nostronger 可应用于水平的OFTHE数据,程序,系统中的物理设备,的communicationslinks,环境,和人员。有时,几个控制areneeded覆盖一个漏洞,有时一个控制一次的addressesmany问题我有更好的答案
已赞过 已踩过<
你对这个回答的评价是?
评论 收起
一四顶4
2013-06-17
知道答主
回答量:36
采纳率:0%
帮助的人:9万
展开全部
不会有人为你翻译这么一大段的,现在的翻译都是收费的啊。这是作业吧?
已赞过 已踩过<
你对这个回答的评价是?
评论 收起
ya...9@hotmail.com
2013-06-17
知道答主
回答量:6
采纳率:0%
帮助的人:8733
展开全部
楼主找便宜来了
已赞过 已踩过<
你对这个回答的评价是?
评论 收起
收起 更多回答(1)
推荐律师服务: 若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询

为你推荐:

下载百度知道APP,抢鲜体验
使用百度知道APP,立即抢鲜体验。你的手机镜头里或许有别人想知道的答案。
扫描二维码下载
×

类别

我们会通过消息、邮箱等方式尽快将举报结果通知您。

说明

0/200

提交
取消

辅 助

模 式