【文章內(nèi)容簡(jiǎn)介】
的拷貝 也是一種盜竊形式, 被稱(chēng)為軟件盜版 。 盜版 軟件 占到 美國(guó)所使用的軟件的 40%。盜版軟件在海外的 比例 甚至更高,如在意大利( 82%)和泰國(guó)( 92%)等國(guó)家。 (3) Manipulation Finding entry into someone’s puter work and leaving a prankster’s message may seem like fun, which is why hackers do it. It is still against the law. Moreover, even if the manipulation seems harmless, it may cause a great deal of anxiety and wasted time among work users. ( 3) 操控 進(jìn)入某人的計(jì)算機(jī)網(wǎng)絡(luò)并留下 惡作劇 式的信息,可能顯得很好玩。這也是為什么黑客這樣做的原因。這樣做仍然是違法的。此外,即使這樣的操作似乎沒(méi)有危害,它也可能給網(wǎng)絡(luò)用戶造成很大的 焦慮 和時(shí)間浪費(fèi)。 Q:what kind of hazard can threat puter systems and data besides criminals? 3. Other Hazards There are plenty of other hazards to puter systems and data besides criminals. They include the following: (1)Natural Hazards Natural forces include fires, floods, wind, hurricanes, tornadoes, and earthquakes. Even home puter users should store backup disks of programs and data in safe locations in case of fire or storm damage. 其他危害 除了罪犯之外 , 計(jì)算機(jī)系統(tǒng)和數(shù)據(jù)還面臨大量其他的危害 。 這包括如下危害: ( 1) 自然危害 大自然的力量 包括火災(zāi)、水災(zāi)、風(fēng)、 颶風(fēng) 、 龍卷風(fēng) 和地震。即使家用計(jì)算機(jī)用戶也應(yīng)在安全地點(diǎn)保存程序與數(shù)據(jù)的備份磁盤(pán), 以防 火災(zāi)或暴風(fēng)的毀壞。 (2) Civil Strife and Terrorism Wars, riots, and other forms of political unrest are real risks in some parts of the world. Even people in developed countries, however, must be mindful that acts of sabotage are possible. ( 2) 內(nèi)亂 與 恐怖主義 戰(zhàn)爭(zhēng)、 暴亂 和其他形式的政治 動(dòng)蕩 在世界的某些地區(qū)是實(shí)實(shí)在在的威脅。然而,即使是發(fā)達(dá)國(guó)家的人們,也必須保持 警惕 ,在他們國(guó)家也可能發(fā)生 破壞 行為。 留神的、注意的 (3) Technological Failures Hardware and software don’t always do what they are supposed to instance, too little electricity, caused by a brownout or blackout, may cause the loss of data in primary storage. Too much electricity, as when lightning or other electrical disturbance affects a power line, may cause a voltage surge, or spike. This excess of electricity may destroy chips or other electronic ponents of a puter. ( 3) 技術(shù)故障 硬件和軟件并不總是做它們?cè)撟龅氖?。例如?電壓不足 或 斷電 引起的電流過(guò)小,可能造成主存儲(chǔ)器中的數(shù)據(jù)丟失。電流過(guò)大,如閃電或其他電干擾 影響 輸電線 時(shí),可能造成電壓 浪涌 或形成電壓 尖峰 。這種電流過(guò)大可能毀壞計(jì)算機(jī)的芯片或其他 電子元件 。 Most microputer users buy a surge protector, a device that separates the puter from the power source of the wall outlet. When a voltage surge occurs, it activates a circuit breaker in the surge protector,protecting the puter system. 大多數(shù)微機(jī)用戶購(gòu)買(mǎi) 浪涌電壓保護(hù)器 , 一種將計(jì)算機(jī)與 壁裝電源插座的 電源 分開(kāi)的設(shè)備 。 電壓浪涌發(fā)生時(shí) , 就會(huì)激活浪涌電壓保護(hù)器中的 斷路器 , 從而保護(hù)計(jì)算機(jī)系統(tǒng) 。 Another technological catastrophe is when a harddisk drive suddenly “crashes,” or fails, perhaps because it has been bumped inadvertently. If the user has fotten to make backup copies of data on the hard disk, data may be lost. 還有一種技術(shù) 災(zāi)難 :硬盤(pán)驅(qū)動(dòng)器突然 “ 崩潰 ” 或出故障 , 原因可能是 不小心的 碰撞 。 如果用戶忘記在硬盤(pán)上備份數(shù)據(jù) , 數(shù)據(jù)就可能丟失 。 (4) Human Errors Human mistakes are inevitable. Dataentry errors are probably the most monplace. Programmer errors also occur frequently. Some mistakes may result from faulty design, as when a software manufacturer makes a deletion mand closely resembling another mand. Some errors may be the result of sloppy procedures. One such example occurs when office workers keep important correspondence under filenames that no one else in the office knows. ( 4) 人為差錯(cuò) 人為差錯(cuò)不可避免 。 數(shù)據(jù)輸入錯(cuò)誤或許是 最常 發(fā)生的 。 程序員錯(cuò)誤也經(jīng)常發(fā)生 。 有些錯(cuò)誤可能是 由 有毛病的 設(shè)計(jì) 所致 , 如軟件制造商將刪除命令設(shè)計(jì)得與另一個(gè)命令 非常 相似 。 有些錯(cuò)誤可能起因于 馬虎的操作步驟 。 辦公室工作人員將重要 函件 保存在 辦公室其他人不知道的 文件名下 , 就是這樣的一個(gè)例子 。 II. Measures to Protect Computer Security Security is concerned with protecting information, hardware, and software. Security measures consist of encryption, restricting access, anticipating disasters, and making backup copies. 二 、 保護(hù)計(jì)算機(jī)安全的措施 安全 與 信息、硬件和軟件的保護(hù) 有關(guān) 。安全措施包括加密、限制訪問(wèn)、 預(yù)防 災(zāi)難和制作備份。 anticipate: v. 預(yù)感、預(yù)料 1. Encrypting Messages Whenever information is sent over a work, the possibility of unauthorized access exists. The longer the distance the message has to travel, the higher the security