信息安全专业科技英语

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1)A hacker is someone who creates and modifies computer software and computer hardware,including computer programming,administration,and security-related items,In computer programming,a hacker is a softwere designer and computer who builds elegant,beautiful programs and systems.

2)Attrack is an assault against a computer system or network as a result of deliberate,intelligent action;for example,denial of service attacks,penetration and sabotage,Such as brute force attack,dictionary attack,denial of service attack,replay attack,piggybacking,penetration and sabotage.

3)Although the activities of the blackhat hacker can be seen as a single shot in the night,the script kiddies scan will appear as a series of shotgun blasts,as their activity will be loud and detectable. 4)Privilege escalation can best be described as the act of leveraging a bug or vulnerability in an application or operating system to gain access to resources that normally would have been protected from an average user.

5)Network Scanning is the use of a computer network for gathering information on computer systems,which may be used for system maintenance,security assessment and investigation,and for attack.

1)最初的黑客是指具有熟练的编写和调试计算机程序的技巧,并使用这些技巧来获得非法或未授权的网络或文件访问,入侵企业内部网的人。随着各种强大的黑客工具的广泛传播,对计算机技术了解很少的人也可以实施黑客攻击行为,因此网络系统受到黑客攻击的可能性大大增加了。

2)主动攻击会造成网络系统状态和服务的改变。主动攻击包括试图阻断或攻破保护机制、引入恶意代码、偷窃或篡改信息。主动攻击可能造成数据资料的泄露和散播,或导致拒绝服务以及数据的篡改,包括大多数的未授权用户企图以非正常手段和正常手段进入远程系统。3)一般完整的攻击过程都是先隐藏自身,在隐藏好自己后在进行预攻击探测,检测目标机器的各种属性和具备的被攻击条件;然后采取相应的攻击方法进行破坏,达到自己的母的之后攻击者会删除自己的行为在目标系统中的日志。

4)缓冲区溢出攻击已成为目前较为主流的攻击方法,但缓冲区溢出的类型有多种,有针对操作系统的溢出,如windows rpc dcom溢出、windows lsass.dll溢出等;也有针对应用服务的溢出,如IIS SSL PCT溢出、SERV-U mdtm溢出、Exchange Server NNTP溢出等。5)拒绝服务(Denial of servive,简称DoS攻击),就是通过非法独占受攻击的目标系统的服务,最终试图阻止合法用户使用受攻击目标提供的网络服务。拒绝服务攻击最常见的就是攻击者通过产生大量流向受害网络的数据包,消耗该网络所有的可用宽带。

1)Until modern times,cryptography referred almost exclusively to encryption,the process of converting ordinary information(plaintext)into something unintelligible;this is a ciphertext.Decryption is the reserve,moving from unintelligible ciphertext to plaintext.

2)In cryptography,a cryptographic hash function is a hash funtion with certain additional security properties to make it suitable for use as a primitive in various information security applications,such as authentication and message integrity.

3)Before the modern era,cryptography was concerned solely with message confidentiality(i.e,encryption)-conversion of messages from a comprehensible form into an incomprehensoble one,and back again at the other end,rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely,the key needed for decryption).

4)Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key(or,less commonly,in which their keys are different,but related in an

相关文档
最新文档