ImageVerifierCode 换一换
格式:DOCX , 页数:13 ,大小:23.37KB ,
资源ID:10245428      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/10245428.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(计算机安全漏洞中英文对照外文翻译文献.docx)为本站会员(b****7)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

计算机安全漏洞中英文对照外文翻译文献.docx

1、计算机安全漏洞中英文对照外文翻译文献计算机安全漏洞中英文对照外文翻译文献(文档含英文原文和中文翻译)Talking about security loopholes reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service

2、 attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the

3、IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the thought can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the

4、 problem. Different perspective of security loopholes In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. specialized s

5、oftware loophole. If Oracle loopholes, Apache, etc. loopholes. 2. Data from the perspective include : could not reasonably be read and read data, including the memory of the data, documents the data, Users input data, the data in the database, network, data transmission and so on. designated can be

6、written into the designated places (including the local paper, memory, databases, etc.) Input data can be implemented (including native implementation, according to Shell code execution, by SQL code execution, etc.) 3. From the point of view of the scope of the role are : Remote loopholes, an attack

7、er could use the network and directly through the loopholes in the attack. Such loopholes great harm, an attacker can create a loophole through other peoples computers operate. Such loopholes and can easily lead to worm attacks on Windows. Local loopholes, the attacker must have the machine premise

8、access permissions can be launched to attack the loopholes. Typical of the local authority to upgrade loopholes, loopholes in the Unix system are widespread, allow ordinary users to access the highest administrator privileges. 4. Trigger conditions from the point of view can be divided into: Initiat

9、ive trigger loopholes, an attacker can take the initiative to use the loopholes in the attack, If direct access to computers. Passive trigger loopholes must be computer operators can be carried out attacks with the use of the loophole. For example, the attacker made to a mail administrator, with a s

10、pecial jpg image files, if the administrator to open image files will lead to a picture of the software loophole was triggered, thereby system attacks, but if managers do not look at the pictures will not be affected by attacks. 5. On an operational perspective can be divided into: File operation ty

11、pe, mainly for the operation of the target file path can be controlled (e.g., parameters, configuration files, environment variables, the symbolic link HEC), this may lead to the following two questions: Content can be written into control, the contents of the documents can be forged. Upgrading or a

12、uthority to directly alter the important data (such as revising the deposit and lending data), this has many loopholes. If history Oracle TNS LOG document can be designated loopholes, could lead to any person may control the operation of the Oracle computer services; information content can be outpu

13、t Print content has been contained to a screen to record readable log files can be generated by the core users reading papers, Such loopholes in the history of the Unix system crontab subsystem seen many times, ordinary users can read the shadow of protected documents; Memory coverage, mainly for me

14、mory modules can be specified, write content may designate such persons will be able to attack to enforce the code (buffer overflow, format string loopholes, PTrace loopholes, Windows 2000 history of the hardware debugging registers users can write loopholes), or directly alter the memory of secrets

15、 data. logic errors, such wide gaps exist, but very few changes, so it is difficult to discern, can be broken down as follows : loopholes competitive conditions (usually for the design, typical of Ptrace loopholes, The existence of widespread document timing of competition) wrong tactic, usually in

16、design. If the history of the FreeBSD Smart IO loopholes. Algorithm (usually code or design to achieve), If the history of Microsoft Windows 95/98 sharing password can easily access loopholes. Imperfections of the design, such as TCP / IP protocol of the three-step handshake SYN FLOOD led to a denia

17、l of service attack. realize the mistakes (usually no problem for the design, but the presence of coding logic wrong, If history betting system pseudo-random algorithm) External orders, Typical of external commands can be controlled (via the PATH variable, SHELL importation of special characters, et

18、c.) and SQL injection issues. 6. From time series can be divided into: has long found loopholes: manufacturers already issued a patch or repair methods many people know already. Such loopholes are usually a lot of people have had to repair macro perspective harm rather small. recently discovered loo

19、phole: manufacturers just made patch or repair methods, the people still do not know more. Compared to greater danger loopholes, if the worm appeared fool or the use of procedures, so will result in a large number of systems have been attacked. 0day: not open the loophole in the private transactions

20、. Usually such loopholes to the public will not have any impact, but it will allow an attacker to the target by aiming precision attacks, harm is very great. Different perspective on the use of the loopholes If a defect should not be used to stem the original can not do what the (safety-related), on

21、e would not be called security vulnerability, security loopholes and gaps inevitably closely linked to use. Perspective use of the loopholes is: Data Perspective: visit had not visited the data, including reading and writing. This is usually an attackers core purpose, but can cause very serious disa

22、ster (such as banking data can be written). Competence Perspective: Major Powers to bypass or permissions. Permissions are usually in order to obtain the desired data manipulation capabilities. Usability perspective: access to certain services on the system of control authority, this may lead to som

23、e important services to stop attacks and lead to a denial of service attack. Authentication bypass: usually use certification system and the loopholes will not authorize to access. Authentication is usually bypassed for permissions or direct data access services. Code execution perspective: mainly p

24、rocedures for the importation of the contents as to implement the code, obtain remote system access permissions or local system of higher authority. This angle is SQL injection, memory type games pointer loopholes (buffer overflow, format string, Plastic overflow etc.), the main driving. This angle

25、is usually bypassing the authentication system, permissions, and data preparation for the reading. Loopholes explore methods must First remove security vulnerabilities in software BUG in a subset, all software testing tools have security loopholes to explore practical. Now that the hackers used to e

26、xplore the various loopholes that there are means available to the model are: fuzz testing (black box testing), by constructing procedures may lead to problems of structural input data for automatic testing. FOSS audit (White Box), now have a series of tools that can assist in the detection of the s

27、afety procedures BUG. The most simple is your hands the latest version of the C language compiler. IDA anti-compilation of the audit (gray box testing), and above the source audit are very similar. The only difference is that many times you can obtain software, but you can not get to the source code

28、 audit, But IDA is a very powerful anti-Series platform, let you based on the code (the source code is in fact equivalent) conducted a safety audit. dynamic tracking, is the record of proceedings under different conditions and the implementation of all security issues related to the operation (such

29、as file operations), then sequence analysis of these operations if there are problems, it is competitive category loopholes found one of the major ways. Other tracking tainted spread also belongs to this category. patch, the software manufacturers out of the question usually addressed in the patch.

30、By comparing the patch before and after the source document (or the anti-coding) to be aware of the specific details of loopholes. More tools with which both relate to a crucial point: Artificial need to find a comprehensive analysis of the flow path coverage. Analysis methods varied analysis and de

31、sign documents, source code analysis, analysis of the anti-code compilation, dynamic debugging procedures. Grading loopholes loopholes in the inspection harm should close the loopholes and the use of the hazards related Often people are not aware of all the Buffer Overflow Vulnerability loopholes ar

32、e high-risk. A long-distance loophole example and better delineation: Remote access can be an OS, application procedures, version information. open unnecessary or dangerous in the service, remote access to sensitive information systems. Remote can be restricted for the documents, data reading. remotely important or restricted documents, data reading. may be limited for long-range document, data revisions. Remote can be restricted for important documents, data changes. Remote can b

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1