计算机专业英语10 网络和计算机安全039Word下载.docx

上传人:b****3 文档编号:16804156 上传时间:2022-11-26 格式:DOCX 页数:12 大小:25.97KB
下载 相关 举报
计算机专业英语10 网络和计算机安全039Word下载.docx_第1页
第1页 / 共12页
计算机专业英语10 网络和计算机安全039Word下载.docx_第2页
第2页 / 共12页
计算机专业英语10 网络和计算机安全039Word下载.docx_第3页
第3页 / 共12页
计算机专业英语10 网络和计算机安全039Word下载.docx_第4页
第4页 / 共12页
计算机专业英语10 网络和计算机安全039Word下载.docx_第5页
第5页 / 共12页
点击查看更多>>
下载资源
资源描述

计算机专业英语10 网络和计算机安全039Word下载.docx

《计算机专业英语10 网络和计算机安全039Word下载.docx》由会员分享,可在线阅读,更多相关《计算机专业英语10 网络和计算机安全039Word下载.docx(12页珍藏版)》请在冰豆网上搜索。

计算机专业英语10 网络和计算机安全039Word下载.docx

1.SecurityViolationDefinition

Computerornetworksecurityhasbeenviolatedwhenunauthorizedaccessbyanypartyoccurs.

2.WhySecurity?

Computersecurityisrequiredbecausemostorganizationscanbedamagedbyhostilesoftwareorintruders.Theremaybeseveralformsofdamagewhichareobviouslyinterrelated.Theseinclude:

•Damageordestructionofcomputersystems.

•Damageordestructionofinternaldata.

•Lossofsensitiveinformationtohostileparties.

•Useofsensitiveinformationtostealitemsofmonetaryvalue.

•Useofsensitiveinformationagainsttheorganization'

scustomerswhichmayresultinlegalactionbycustomersagainsttheorganizationandlossofcustomers.

•Damagetothereputationofanorganization.

•Monetarydamageduetolossofsensitiveinformation,destructionofdata,hostileuseofsensitivedata,ordamagetotheorganization'

sreputation.

Themethodsusedtoaccomplishtheseunscrupulousobjectivesaremanyandvarieddependingonthecircumstances.Thisguidewillhelpadministratorsunderstandsomeofthesemethodsandexplainsomecountermeasures.

3.SecurityIssues

Computersecuritycanbeverycomplexandmaybeveryconfusingtomanypeople.Itcanevenbeacontroversialsubject.Networkadministratorsliketobelievethattheirnetworkissecureandthosewhobreakintonetworksmayliketobelievethattheycanbreakintoanynetwork.Ibelievethatoverconfidenceplaysanimportantroleinallowingnetworkstobeintrudedupon.Therearemanyfallaciesthatnetworkadministratorsmayfallvictimto.Thesefallaciesmayallowadministratorstowrongfullybelievethattheirnetworkismoresecurethanitreallyis.

Thisguidewillattempttoclarifymanyissuesrelatedtosecuritybydoingthefollowing:

•Helpyoudeterminewhatyouareprotecting.

•Breakcomputersecurityintocategories.

•Explainsecuritytermsandmethods.

•Pointoutsomecommonfallaciesthatmayallowadministratorstobeoverconfident.

•Categorizemanycommonattacksagainstnetworksandcomputers.

•Explainsomeattackmethods.

•Describetoolsthatcanbeusedtohelpmakeanetworkmoresecure.

4.SecurityInterdependence

Therearemanydifferentaspectstocomputerandnetworksecurity.Thesedifferentareasofcomputersecurityareinterdependentoneachotherinorderforanetworktobesecure.Ifoneormoreareasofcomputersecurityareignored,thentheentiresecurityintegrityoftheorganization'

snetworkmaybecompromised.Aclearexampleofthisisintheareaofcomputervirusorwormprotection.Computervirusprotectionprogramscanonlyfilterknownvirusesorworms.Therearevirusesorwormsthatarenotyetrecognizedasvirusprogramsimmediatelyaftertheirrelease.Thebestwaytomakeunrecognizedvirusorwormprogramslesseffectiveisbyquicklyremovingthevulnerabilitiesthattheyuse.Someofthesevulnerabilitiesareoperatingsystemandapplicationprogramerrors.Whensecuritypatchesarecreatedforsoftware,theyshouldbequicklyapplied.Inthiswaythevulnerabilitytovirusesisminimizedbutnoteliminated.Thereareotherstepswhichmayfurtherreducethisvulnerability,butitcanneverbecompletelyeliminated.

5.SecurityLimitationsandApplications

Ifyouarereadingthisdocumentandarethinkingthatyoucangetalltheinformationrequiredtomakeyournetworkcompletelysecure,thenyouaresadlymistaken.Inmanyways,computersecurityisalmostastatisticalgame.Youcanreducebutnoteliminatethechancethatyoumaybepenetratedbyanintruderorvirus.Thisismainlyforonereason:

Noonecaneverknowallthesoftwarevulnerabilitiesofallsoftwareusedonasystem.

Thisiswhyeventhosewhoconsiderthemselveshackerswillsaythatthenumberonecomputersecuritythreatisthelackofqualityintheapplicationsandoperatingsystems.

Thebottomlinehereisthatunlessyoucanremovealltheapplicationandoperatingsystemproblemsthatallowvirusesandintruderstopenetratenetworks,youcanneversecureyournetwork.Additionallytheusersonyournetworkarepotentiallyagreatersecurityriskthananyprograms.Obviouslyremovingallvulnerabilitiesisimpossibleandwillnotsecureyournetworkagainstusererrors.Ihaveevenconsideredthepossibilitythatanoperatingsystemwithoutanetworkinterfacecanbecompletelysecure,buteventhiscannotbeguaranteed.UnknownvirusesorTrojanprogramscancreepinwithapplicationsonCDsorfloppies.Thishasbeenknowntohappen.Althoughanattackermaynotbeabletogetdatafromthesystem,theycandamageordestroydata.

6.LayeredSecurity

Thefactthatcompletesecurityisimpossibleisthereasonsecurityexpertsrecommend"

layeredsecurity"

.Theideaistohavemultiplewaysofpreventinganintrusiontodecreasethechancethatintrusionswillbesuccessful.Forexample,youshouldhavevirusprotectiononyourclientcomputers.Tohelplayerthissecurityyoushouldalsofiltervirusesatyouremailserver.Tohelpevenmore,youshouldblockthemostdangeroustypesofemailattachmentstopreventunrecognizedvirusesandotherhostilesoftwarefromenteringyournetwork.Anothergooddefenselayerwouldalsoincludeeducatingyourusersaboutviruses,howtheyspread,andhowtoavoidthem.

Hackers

Therearemanydocumentsthatattempttodefinethetermhacker.Ibelievethatthetermhackerisaconnotativeterm.Thismeansthatitismoredefinedbypeople'

sbeliefsratherthanbyadictionary.Somebelievethatahackerisaveryskilledcomputerperson.Othersbelievethathackersarethosethatperformunauthorizedbreakintocomputersystems.Themediaandmanysourceshavecausedmanyuninformedpeopletobelievethatahackerisathreattocomputerandnetworksecuritywhilethisisnotthecase.Ahackerisnomorelikelytobreakthelawthananyoneelse.Iusethemoreaccuratedescriptiveterm,"

intruder"

todescribethosewhointrudeintonetworksorsystemswithoutauthorization.

8.PhysicalSecurity

Thisguidewillnottalkaboutphysicalcomputersecuritybeyondthisparagraph.Yourorganizationshouldbeawarehowphysicallysecureeveryaspectofitsnetworkisbecauseifanintrudergetsphysicalaccess,theycangetyourdata.Besurethatyourorganizationproperlysecureslocationsandconsiderthefollowing:

•Servers-Containyourdataandinformationabouthowtoaccessthatdata.

•Workstations-Maycontainsomesensitivedataandcanbeusedtoattackothercomputers.

•Routers,switches,bridges,hubsandanyothernetworkequipmentmaybeusedasanaccesspointtoyournetwork.

•Networkwiringandmediaandwheretheypassthroughmaybeusedtoaccessyournetworkorplaceawirelessaccesspointtoyournetwork.

•Externalmediawhichmaybeusedbetweenorganizationalsitesortoothersitestheorganizationdoesbusinesswith.

•Locationsofstaffwhomayhaveinformationthatahostilepartycanuse.

•Someemployeesmaytakedatahomeormaytakelaptopshomeoruselaptopsontheinternetfromhomethenbringthemtowork.Anyinformationontheselaptopsshouldbeconsideredtobeatriskandtheselaptopsshouldbesecureaccordingtoproperpolicywhenconnectedexternallyonthenetwork.

9.SomeTerms

Thisparagraphdescribessomecommonlyusedcomputersecurityterms.

•Protocol-Welldefinedspecificationallowingcomputercommunication.

•Confidentiality-Informationisavailableonlytopeoplewithrightfulaccess.

•Integrity-Informationcanonlybechangedbyauthorizedpersonnel.Thereceiverofthemessageshouldbeabletotellthemessagewasnotmodified.

•Availability-Informationisavailabletoonlythosewhoneedit.

•Verification-nonrepudiation-Thereisproofthatthesendersentthemessage

•Authentification-Thereceiverofthemessageshouldbeabletobesureoftheoriginofthemessage.Requiresadigitalsignature(Onewayhash,publickeyalgorithm,andsymmetricalgorithm)orapublickeyalgorithm.

•Spyware-Acomputerprogramwhosepurposeistospyonyourinternetactivitiesusuallyformarketingpurposesandusuallydonebyashadycorporateentity.

•Malware-Acomputerprogramwithsomeevilintent.Itmayonthesurfacehaveagoodoru

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 法律文书 > 调解书

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1