freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

計算機(jī)圖形學(xué)英文版課件第十章chapter-在線瀏覽

2024-12-05 20:14本頁面
  

【正文】 等 。 Characteristics of Computer Intrusion and Kinds of Security Breaches Chapter 10 Computer and Network Security 計算機(jī)專業(yè)英語 108 KINDS OF SECURITY BREACHES The major assets of puting systems are hardware, software, and data. There are four kinds of threats to the security of a puting system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in puting systems. These four threats are shown in . 計算機(jī)系統(tǒng)的主要資源是硬件 、 軟件和數(shù)據(jù) 。 這四種威脅都利用了計算機(jī)系統(tǒng)資源的脆弱性 , 圖 101表示這四種威脅 。 例如 , 蓄意破壞硬件設(shè)備 , 抹除程序或數(shù)據(jù)文件或造成操作系統(tǒng)的文件管理程序故障 , 以致不能找到某一磁盤文件 。 外界用戶可以是一個人 、 一個程序或一個計算機(jī)系統(tǒng) 。 數(shù)據(jù)丟失可能會很快被發(fā)現(xiàn) , 但很可能截取者并不留下任何容易檢測的痕跡 。例如,某人可以修改數(shù)據(jù)庫中的值, 更換一個程序,以便完成另外的計算,或修改正在傳送的數(shù)據(jù), 甚至還 可能修改硬件。 Characteristics of Computer Intrusion and Kinds of Security Breaches Chapter 10 Computer and Network Security 計算機(jī)專業(yè)英語 1013 KINDS OF SECURITY BREACHES (4) Finally, an unauthorized party might fabricate counterfeit objects for a puting system. The intruder may wish to add spurious transactions to a work munication system. or add records to an existing data base . Sometimes these additions can be detected as feries, but if skillfully done, they are virtually indistinguishable from the real thing. (4)最后 , 非授權(quán)用戶可以 偽造 計算機(jī)系統(tǒng)的一些對象 。 有時 , 這些增加的數(shù)據(jù)可以作為偽造品檢測出來 ,但如果做得很巧妙 , 這些數(shù)據(jù)實(shí)際上無法與真正的數(shù)據(jù)分開 。 Chapter 10 Computer and Network Security 計算機(jī)專業(yè)英語 1015 New Words amp。 解密是加密過程的逆過程 。 The two main peting cryptography schemes are known as the secretkey (symmetric) system and the publickey (asymmetric) system. The secretkey system uses a single, wholly secret sequence both to encrypt and to decrypt messages. The publickey system uses a pair of mathematically related sequences, one each for encryption and decryption [1]. 現(xiàn)在有兩種主要的 、 相互競爭的密碼術(shù):秘鑰 ( 對稱 ) 和公鑰 ( 不對稱 ) 系統(tǒng) 。 公鑰系統(tǒng) 采用一對數(shù)學(xué)上相關(guān)的序列 , 一個用于加密 , 另一個用于解密 。 1977年 , 該方案成為美國聯(lián)邦標(biāo)準(zhǔn) 。 下面是有關(guān)明文 、 密文和密鑰關(guān)系的表示法 。 類似的 , P=D k (C)代表對 C解密得到明文 。 如果未加密的 “ 明文 ” 是不易理解的 , 即使算出報文也可能解不開 。 使用三重 DES時 , 每個 64位數(shù)據(jù)塊用三種不同的 DES密鑰加密 。 Chapter 10 Computer and Network Security 計算機(jī)專業(yè)英語 1020 Modern Cryptography Data Encryption Publickey encryption The key distribution problem has always been the weak link in the secretkey systems. Since the encryption key and decryption key are the same( or easily derived from one another) and the key has to be distributed to all users of the system, it seemd as if there was an inherent builtin problem: keys had to be protected from theft, but they also had to be distributed, so they could not just be locked up in a bank vault. 公鑰加密 密鑰的分布問題在秘鑰系統(tǒng)中一直是一個薄弱環(huán)節(jié) 。 Chapter 10 Computer and Network Security 計算機(jī)專業(yè)英語 1021 Modern Cryptography Data Encryption Encryption can be used to protect data in transit as well as data in storage. Some vendors provide hardware encryption devices that can be used to encrypt and decrypt data. There are also software encryption packages which are available either mercially or as free software. 加密可以用來保護(hù)傳輸中的數(shù)據(jù)和存儲器中的數(shù)據(jù) 。 也可買到軟件加密程序包或作為自由軟件免費(fèi)獲得 。 Chapter 10 Computer and Network Security 計算機(jī)專業(yè)英語 1022 Modern Cryptography Data Encryption In public key cryptosystem, the encryption and decryption keys were different, and plaintext encrypted with the public key can only be deciphered with the private key from the same pair. Conversely, plaintext encrypted with the private key can be decrypted only with the public key[4] ( it is used in electronic signatures). The notations for these are as follows. C=E k (P) , P=D k1(C)=D k1 (E k (P)) or C=D k1 (P), P=E k (C)=E k (D k1 (P)) 在公鑰秘鑰系統(tǒng)中 , 加密和解密密鑰是不同的 。 相反 , 用私有密鑰加密的明文只能用公開密鑰解密( 它用于電子簽名 ) 。 用戶可以讓他們的公開密鑰自由地使用 , 或把它們放在密鑰分配中心供其他人存取 。 在公開密鑰系統(tǒng) , 無需找一條傳送共享的私有密鑰的安全通道 。 Expressions firewall n. 防火墻 offensive adj. 無理的 , 攻擊性的 hacker n. 黑客 filter v. 過濾 , 濾過 , 滲入 private 私有的 , 秘密地 packet n. 小包 , 信息包 employee n. 職員 , 雇工 tel n. 遠(yuǎn)程登錄 traffic n. 流量 proxy n. 代理 retrieve v, 檢
點(diǎn)擊復(fù)制文檔內(nèi)容
教學(xué)課件相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1