【2019年整理】计算机专业英语第10章

合集下载
相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

modification 修改
fabricate v. 伪造
tamper v. 篡改
spurious adj. 假的
Abbreviations:
计算机专业英语
10-4
Chapter 10 Computer and Network Security
10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
involve 包含,涉及,也可不译
depositor 寄托者
vulnerability 弱点,攻击
perimeter 周围,周边 penetrate vt. 攻破,攻击
Exposure 曝光,揭露 threat n. 威胁,恐吓
asset 资产
interruption 中断,打断
interception 截取
10.1.1 入侵计算机的特点
Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed.
最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不 可能是最常用的,也不可能是针对已经采取了最可靠的防范措施的方法。
This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are.
计算机专业英语
10-3
Chapter 10 Computer and Network Security
10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
New Words & Expressions:
breach 破坏,缺口
Difficult points: distinguish between four
kinds of computer security breaches
计算机专业英语
10-2
Chapter 10 Computer and Network Security
Requirements:
1. Principle of easiest penetration 2. The kinds of computer security breaches 3. What is firewall 4. 了解科技论文标题的写法
10.1.2 KINDS OF SECURITY BREACHES
In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or denial of legitimate access to computing . A vulnerability is a weakness in the security system that might be exploited to cause loss or harm.
10.1.2 KINDS OF SECURITY BREACHES
A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnerability.
这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强
了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻
击的方法是什么。
计算机专业英语
10-5
Chapter 10 Computer and Network Security
10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式; 暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机。 脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。
计算机专业英语
10-6
Chapter 10y
10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
Computer English
Chapter 10 Computer and Network Security
Chapter 10 Computer and Network Security
Key points: useful terms and definitions
of computer security
相关文档
最新文档