计算机专业文献翻译计算机系统.docx

上传人:b****5 文档编号:27865084 上传时间:2023-07-05 格式:DOCX 页数:15 大小:28.86KB
下载 相关 举报
计算机专业文献翻译计算机系统.docx_第1页
第1页 / 共15页
计算机专业文献翻译计算机系统.docx_第2页
第2页 / 共15页
计算机专业文献翻译计算机系统.docx_第3页
第3页 / 共15页
计算机专业文献翻译计算机系统.docx_第4页
第4页 / 共15页
计算机专业文献翻译计算机系统.docx_第5页
第5页 / 共15页
点击查看更多>>
下载资源
资源描述

计算机专业文献翻译计算机系统.docx

《计算机专业文献翻译计算机系统.docx》由会员分享,可在线阅读,更多相关《计算机专业文献翻译计算机系统.docx(15页珍藏版)》请在冰豆网上搜索。

计算机专业文献翻译计算机系统.docx

计算机专业文献翻译计算机系统

10.2SomeApproachestoDefense

10.2.1BasicSecurityMeasures

Allcomputersystemsneedasetofbasicsecuritymeasures.WhetherthesystemisasimplepersonalcomputerinyourhomeoramajorcomputernetworksuchastheInternet,itisnecessarytoprotectthehardwareandsoftwarefromtheft,destruction,andmaliciousactsofvandalism.securitymeasurescanbeassimpleaslockingthedoororasadvancedasapplyingvirtuallyunbreakableencryptiontechniquestodata.Let’sbreakthebasicsecurity,surveillance,passwords,auditing,accessrights,standardsystemsattacks,andviruses.

Externalsecurityofacomputersystemoracomputernetworkconsistsofprotectingtheequipmentfromphysicaldamage.Exampleofphysicaldamageincludefire,flood,earthquakes,powersarges,andvandalism.Commonsensedamagepreventiontechniquesareusuallyenoughinmanycasesofexternalsecurity.Roomscontainingcomputerequipmentshouldalwaysbelocked.Unauthorizedpersonsshouldnotbeallowedintoroomscontainingcomputingequipment.Cabling,andthedevicesthatcablespluginto,shouldnotbeexposedifatallpossible.

Iftheequipmentneedstobeintheopenforpublicaccess,theequipmentshouldbelockeddown.Manykindsofanti-theftdevicesexistforlockingcabinets,lockingcablestocabinets,lockingdownkeyboards,andlockingperipheraldevices.Forexample,onemanufacturermakesadevicethattransmitsawirelesssignaltoapagershouldacomputercabinetbeopened.Thepersoncarryingthepagerwillknowimmediatelywhichcabinetisbeingopenedsothatsecuritycanbesenttotheappropriatelocation.

Itisalsofairlycommonknowledgenottoplaceexpensivecomputersystemsinthebasementsofbuildings.Basementscanfloodandarefloodandareoftenhighhumiditylocations.Roomswithalargenumberofexternalwindowsarealsonotadvisable.Windowscanletinsunshine,whichcanincreasethetemperatureofaroom.Computerequipmenttypicallyheatsupawindowlessroom.Withtheadditionofsunlight,theincreaseintemperaturemaystrainthecapacityofanyexistingairconditioningequipment.Astemperaturesrise,thelifeexpectancyofcomputercircuitsdecreases.Also,externalwindowscanincreasetheprobabilityofvandalism.

Topreventelectricaldamagetocomputingequipment,high-qualitysurgeprotectorsshouldbeusedonalldevicesthatrequireelectricalcurrent.Theelectricalcircuitsthatprovidepowertodevicesshouldbelargeenoughtoadequatelysupportthedevicewithoutplacingastrainontheelectricalsystem.Electricalcircuitsthatpowerupanddowncausingpowerfluctuation,suchaslargemotors,shouldbeoncircuitsseparatefromthecomputerdevices.Finally,devicesthataresusceptibletodamagefromstaticelectricitydischargesshouldbeproperlygrounded.

Operationalsecurity

Operationalsecurityofacomputernetworkinvolvesdeciding,andthenlimiting,whocanusethesystemandwhentheycanusethesystem,Consider,forexample,alargecorporationinwhichtherearemanylevelsofemployeeswithvaryingjobdescriptions.Employeeswhodonotnormallycomeincontactwithsensitivedataareasshouldnothaveaccesstosensitivedata.Forexampleifanemployeesimpleperformsdataoperationsmorethanlikelyheorsheshouldnotbeallowedaccesstopayrolldatabase,butmorethanlikelydonotneedaccesstoinformationregardingcorporateresearchprograms.Amanagerofanareawouldprobablyhaveaccesstomuchinformationinhisorherdepartment,buthisorheraccesstoinformationinotherdepartmentswouldlikelybelimited.Finallytop-levelexecutiveoftenhaveaccesstoawiderangeofinformationwithinacompany.However,manycompaniesevenlimitinformationaccesstotop-levelmanagement.

Localareanetworkanddatabasesystemsprovidemuchflexiblyinassigningaccesstightstoindividualsorgroupsofindividuals,asyouwillseeshortly.Computernetworkspecialist,alongwithdatabaseadministratorsandsomeoneatthetoplevelsofmanagementsuchastheChiefInformationOfficer(CIO),oftendecidehowtobreakthecompanyintoinformationaccessgroups,decidewhoisineachgroup,anddeterminewhataccessrightseachgrouphas.Asyoumightrecallsomenetworkoperatingsystems,suchasNovell’sNet-WareandWindowsNT,areverygoodapplicationforcreatingworkgroupsandassigningrights.

Itisalsopossibletolimitaccesstoasystembythetimeofdayorthedayoftheweek.Iftheprimaryactivityinonepartofyourbusinessisaccessingpersonnelrecords,andthisactivityisonlyperformedduringworkinghoursbyemployeeinthepersonnelorhumanresourcesdepartment,thenitmightbereasonabletodisableaccesstopersonnelrecordsafterworkinghours,suchasfrom5:

30p.m.until7:

00a.m.thenextmorning.Likewise,thenetworkadministratorcouldalsodenyaccesstothissystemonweekends.

Itmayalsobewisetolimitremoteaccesstoasystemduringcertaintimesofthedayorweek.Withappropriatelimitsset,someonedialinginat2:

30a.m.totransferfundsfromoneaccounttoanothermaysignalanillegalactivity.Ifallcorporatefundtransferscanonlyoccurduringtypicalbusinesshours,thisrestrictionwouldbereasonabletoplaceondial-inactivity.

Surveillance

Althoughmanyindividualfeelsurveillanceisanintrusionintoanindividual’sprivacy,manynetworkadministratorsfeelitisagooddeterrenttocomputervandalismandtheft.Theproperplacementofvideocamerasinkeylocationscanbothdetercriminalsandbeusedtoidentifycriminalsintheeventofvandalismortheft.

Thereare,however,otherformsofsurveillanceinadditiontocapturingliveactionwithavideocamera.Forexample,placingatransmitterineachcomputerthatsendsasignaltoapagerifthecomputercabinetisopened,isawirelessfromofsurveillance.Usingaformofsurveillancecalledintrusiondetection,manycompanieselectronicallymonitordataflowandsystemrequestsintoandoutofasystem.Ifunusualactivityisnoticed,protectiveactioncanbetakenimmediately.Intrusiondetectionisagrowingfieldofstudyinnetworksecurity.Companiesthatacceptmerchandiseordersusingthetelephoneoftenmonitoreachtelephonecall.Companiesclaimthisformofsurveillancecanimprovethequalityofcustomerserviceandhelpsettlefuturedisputes.

PasswordsandIDsystems

Almosteverysystemthatstoressensitiveorconfidentialdatarequiresanauthorizedusertoenterapassword,personalIdentificationNumber,orsomeotherformofIDbeforegainingaccesstothesystem.Typically,thispasswordorIDissomethingeitherrememberedbytheuseroraphysicalfeatureofauser,suchasafingerprint.Technologyinthisareaisimprovingrapidlyascompaniestrytoincorporatesystemsthatarelessvulnerabletofraud.

Perhapsthemostcommonformofprotectionfromunauthorizeduseofacomputersystemisthepassword.Anyoneaccessingacomputersystem,bankingsystem,oralongdistancetelephonesystemisrequiredtoenterapasswordsare:

(1)Onlinecomputeraccounts;

(2)Computernetworkandmainframecomputeraccessatworkandschool;

(3)Longdistancetelephonecreditcarduse;

(4)Twenty-fourhourautomaticbankingservices;

(5)Accesstoretirementaccountsandbankingservices;

(6)Accesstoe-mailandvoicemailsystems;andaccesstoInternetwebsitesatwhichacustomerprofileiscreatedandstoredforfuturetransactions.

Althoughthepasswordisthemostcommonformofidentification,itisalsooneoftheweakest.Toooftenpasswordsbecomeknown,or“misplaced”andfallintothewronghands.Occasionallyapasswordiswrittenonpaper,andthepaperisdiscoveredbythewrongpeople.Moreoften,however,thepasswordistoosimpleandsomeoneelseguessesit.Standardrulesthatanindividualshouldfollowwhencreatingorchangingapasswordinclude;

(1)Changeyourpasswordoften;

(2)Pickagoodpasswordbyusingatleasteightcharacters,mixingupperandlowercaseifthecomputersystemiscasesensitive,andmixingletterswithnumbers.

(3)Don’tchoosepasswordsthataresimilartofirstorlastnames,petnames,carnames,orotherchoicesthatcanbeeasilyguessed.

(4)Don’tshareyourpasswordwithothers;doingsoinvitestroubleandmisuse.

Somecomputersystemsgeneraterandompasswordsthatareverydifficulttoguess,butarealsohardtoremember.Often,theuserwhoisgivenarandomlygeneratedpasswordeitherchangesittosomethingsimpler,makingiteasiertoguess,orwritesitdownonapieceofpaper,defeatingthewholepurposeofasecretpassword.Somesystemsalsodisallowobviouspasswordsoralreadyusedpasswords,thusrequiringtheusertobecreativeandselectapasswordthatisdifficulttoguess.

AcommonfallacyamongcomputersystemusersisthattheinternaloperatingsystemfilethatstorestheloginIdsandpasswordsissusceptibletointrusion.Interestingly,mostcomputersystemsstorepasswordsinanencrustedformforwhichthereisnoknowndecryption.Howthendoesthesystemknowwhenyouhaveenteredthecorrectpassword?

WhenauserentershisorherloginIDandpassword,thepasswordisencryptedandcomparedwiththeentryintheencryptedpasswordfile.Ifthetwoencryptedpasswordsmatch,theloginisallowed.Anyonewhogetsaccesstothisencryptedpasswordfilewilldiscoveronlyunreadabletext.Thisencryptedtechniqueexplainswhy.whenyouforgetyourpassword,acomputeroperatorcannotsimplyreadafileandtellyouwhatitis.Thecomputeroperatorcanonlyresetthepasswordtosomethingnew.

Sincetherearesomanyweaknessestothepassword,otherformsofidentificationhaveemerged.Biometrictechniquesthatscansomethingabouttheuser,suchasvoice

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 党团工作 > 入党转正申请

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1