计算机网络的安全问题有哪些_计算机领域中有安全问题吗
【shitiku.jxxyjl.com--软件水平学习指南】
this book is about security for computing systems,not banks.consider the security differences between computing systems and banks.• size and portability.the physical devices in computing are so small that a thousand dollars of computing gear will fit comfortably in a briefcase,and ten thousand dollars’ worth can be carried comfortably in two arms.
• ability to avoid physical contact.electronic funds transfers account for most transfers of money between banks.for example,private companies pay employees by direct computer transfer instead of check.utilities,insurance companies,and mortgage companies automatically process deductions against their clients’bank accounts.customers can even bank at home,moving funds between accounts and arranging withdrawals by touch-tone phone access to a computer.
• value of assets.the value of the information stored in a computer is also high.some computers contain confidential information about a person’s taxes,investments,medical history,or education.other computers contain very sensitive information about new product lines,sales figures,marketing strategy,or military targets,troop movements,weapons capabilities and so forth.
in terms of security,computing is very close to the v,ild wept days.at some installations,computers and their data have been recognized as a valuable and vulnerable resource,and appropriate protection has been applied.other installations are dangerously deficient in their security measures.but,unlike the“wild west”bankers,some computing professionals and managers do not even recognize the value of the resources they use or control.
worse yet,in the even of a crime,some companies will not investigate or prosecute,for fear that it will damage their public image.for example,would you feel safe depositing your money in a bank that had just suffered a five million dollar loss through computer embezzlement?[1]
criminal investigation and prosecution are hindered by statutes that do not recognize electromagnetic signals as property.the new、media have recently pictured computer intrusion by teenagers as pranks no more serious than tipping over an outhouse.
obviously,security in computing is a very important issue.it is an area that deserves study by computer professionals,managers,and even many computer users.
notes
[1]这是一个疑问句,that引出的定语从句修饰bank。
keywords
security 安全(性)
alarm system 报警系统
portability 可携带性,可移植性
intrusion 入侵
exercises
fill in the blanks with appropriate words or phrases.
(1)electronic funds transfers are able to avoid___with money.
(2)private companies pay employees by___.
(3)at some installations,___have been recognized as a valuable and vulnerable resource.
(4)because electromagnetic signals are not recognized as properly,___are hindered.
(5)___is an area that deserves study by computer professionals,managers,and even many computer users.
(6)size of notebook computer is very___.
(7)the value of the information stored in a computer is___.
a.security in computing
b.direct computer transfer
c.criminal investigation and prosecution
d.small
e.physical contact
f.computers and their data
g.high
答案:
1.
(1)e (2)b (3)f (4)c
(5)a (6)d (7)g
翻译:
本书所讲的是有关计算机系统而不是银行的安全问题,下面是二者在安全方面的一些不同。
• 规模和可携带性。计算机中各个部件都太小,上千美元的设备很容易装入公文包,上万美元的机器两臂一抱就可以拿走。
• 可以避免人的接触。银行之间大多采用电子资金转账。例如,私人公司直接用计算机转账付给雇员工资而不用支票。公用事业公司、保险公司和抵押公司自动在他们的客户银行账户上扣除金额。客户甚至可以在家里“上”银行,即通过按键电话操纵计算机将其资金在两个账户之间转移或取款。
• 资产价值。存储在计算机中的信息,价值也很高。某些计算机中保存有关个人税务、投资、病历或受教育等情况的机密信息;而另外一些计算机中保存有关新产品系列、销售数字、市场策略或军事目标、部队换防、武器性能等非常敏感的信息。
就安全问题而言,计算机非常接近于早些年代的边远的西部所面临的情况。在一些设施中,由于认识到计算机和它保存的数据是有价值和易受侵犯的资源,已采取了相应的防范措施。另外一些设施缺乏应有的安全措施,这种情形很危险。而且,与边远的西部的银行家们不同,某些计算机专业人员和经理还没有认识到他们所使用或管理的资源的价值。
更糟糕的是某些公司由于担心有损于公司的公众形象,即使发生了盗窃案件也不调查,也不告发。例如,你在银行的钱有500万美元通过计算机被盗走了,你还感到把钱存入银行安全吗?
由于法规不把电磁信号作为法律判断依据,因而影响了对犯罪事实的调查和起诉。最近新闻媒体将青少年入侵计算机描绘成恶作剧,认为后果还不如推倒一间厕所严重。
很明显,计算机安全是很重要的,这是值得计算机专业人员、经理甚至于很多计算机用户研究的领域。
本文来源:https://shitiku.jxxyjl.com/ruanjianshuipingxuexizhinan/49033.html
-
如何应对网络安全|应对网络安全新要求详细阅读
随着网络安全向更高层次的发展,其趋势已经从基础的网络层建设开始向应用层和内容层建设过渡,北京网康科技的互联网控制网关系列产品就是针对国内网络安全市场的新需求,在2005年推出的面向应用层和内容层的网络内容安全产品,目前已经得到用户和经销商的广泛认可。为了让更多的人认识内容安全的重要性和体验...
-
【交换机连接交换机】交换机系列培训:交换机如何工作(二)详细阅读
交换是当前网络技术发展的方向。路由技术是交换网络的重要组成部分。交换网络中路由技术选用得正确与否,将直接影响到网络的整体性能的好坏。因此路由技术越来越受到生产厂家与网络设计人员的重视。 一、三种路由技术 目前交换网络中的路由技术有三种,其中第一种是最为保守的方法,即第三...
-
[计算机软件水平考试与计算机四级]计算机软件水平考试辅导:c++学习要点详细阅读
c++学习要点 1 传指针时,我们可以通过指针来修改它在外部所指向的内容。但如果要修改外部指针所指向的对象是不可能的。例如传递外部指针到函数内来分配空间,必须传递指针的指针或指针的引用。 2 char carry[10] = {0}; 编译器会将其后所有的东西都置0; 3 函数返回值为con...
-
网络工程师和网络设计师|网络设计师考试后的一些感想详细阅读
这是我第一次贴这样长的帖子。望各位考过的朋友帮助我补充不足,以利于朋友们通过考试!这篇文档记录了我参 年度计算机软件专业技术资格和水平考试网络设计师部分考试后的一些感想。我幸运的通过了(考试 考号:011606800229,上午成绩 45 ,下午成绩46 ;合格标准:网络设计师,总分为9...