ImageVerifierCode 换一换
格式:DOCX , 页数:32 ,大小:457.84KB ,
资源ID:9302529      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/9302529.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(信息保障与安全doc.docx)为本站会员(b****8)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

信息保障与安全doc.docx

1、信息保障与安全doc1. This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet security, which rely heavily on cryptographic techniques.这本书主要集中在两大领域:加密算法与协议,具有广泛的应用范围;网络和网络安全,这很大程度上依赖于加密技术。 Cryptographic algorithms and pr

2、otocols can be grouped into four main areas:加密算法与协议可以分为四个主要部分: Symmetric encryption: Used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords.对称加密:用来隐藏任何大小的数据块和数据流,包括消息、文件、加密密钥和密码。 Asymmetric encryption: Used to conceal small bl

3、ocks of data, such as encryption keys and hash function values, which are used in digital signatures.非对称加密:用来隐藏小数据块,如加密密钥和散列函数值,这是用于数字签名。 Data integrity algorithms: Used to protect blocks of data, such as messages, from alteration ,:ltrein.数据完整性算法:通常保护数据块,比如信息的变化。 Authentication protocols: These are

4、 schemes based on the use of cryptographic algorithms designed to authenticate the identity of entities.认证协议:这些都是基于密码算法设计实体的身份认证方案的使用。10 09 2. COMPUTER SECURITY: The NIST Computer Security Handbook NIST95 defines the term computer security as follows:The protection afforded to an automated informati

5、on system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware固件, information/ data, and telecommunications通信). This definition introduces three key objectives that are at th

6、e heart of computer security:计算机安全:NIST计算机安全手册 nist95 计算机安全术语定义如下:给一个自动保护信息系统以达到保存完整,适用的目标的可用性,保密的信息系统资源(包括硬件、软件、固件、信息、数据和通信)。这个定义了计算机安全核心的三个关键目标:1) Confidentiality(机密性,保密性): Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and

7、proprietary information. A loss of confidentiality is the unauthorized disclosure of information. This term covers two related concepts: Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals. Privacy: Assures that indivi

8、duals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.1)保密性:保存授权限制访问和公开信息,包括保护个人隐私和机密信息的方法。保密性损失就是保密信息XX而被公开。这个术语涵盖了两个相关的概念:数据机密性:确保私人或机密信息不可用或泄露给未授权的人。隐私:确保可以被收集和储存或者可能会被公开的涉及个人控制或影响的相关信息。2) Integrity(完整性) i

9、nterti : Guarding against improper information modification or destruction破坏, including ensuring information nonrepudiation and authenticity.确保消息的不可否认性和真实性. A loss of integrity is the unauthorized modification or destruction of information. This term covers two related concepts: Data integrity: Assu

10、res that information and programs are changed only in a specified and authorized manner. System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.2)完整性:防止不良信息的修改和破坏,包括确保信息不可否认性性和真实性。损失完

11、整性是信息的XX的修改或破坏。这个术语涵盖了两个相关的概念:数据完整性:确保信息和程序只能在一个指定的授权方式下改变。系统的完整性:确保一个系统在一个未受损害的方式执行其预定的功能,免受有意或无意的XX的操作系统。3) Availability,veilbilti(可用性,有效性): Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information

12、system. Assures that systems work promptly and service is not denied to authorized users.These three concepts form what is often referred to as the CIA triad traid ;The three concepts embody the fundamental security objectives for both data and for information and computing services. 3)可用性:确保及时、可靠地访

13、问和使用信息。损失有效性是访问或使用信息或信息系统的中断。保证系统工作的及时和服务不拒绝授权的用户。这三个概念的形式通常被称为CIA的三元组。这三个概念体现了对数据和信息以及计算机安全的基本安全目标。3. we use three levels of impact on organizations or individuals should there be a breach of security (i.e., a loss of confidentiality,integrity, or availability). These levels are defined in FIPS PUB

14、 199: Low level Moderatemdrit level High level we use three levels of impact on organizations or individuals should there be a breach of security (i.e., a loss of confidentiality,integrity, or availability). These levels are defined in FIPS PUB 199: Low level Moderatemdrit level High level 我们使用三个级别的

15、影响组织或者个人的违反安全的行为(破坏机密性、完整性、可获得性)。这些级别在FIPS PUB 199定义为:低级、中级、高级Low level: The loss could be expected to have a limited adverse effect on organizational operations, organizational assets set资产, or individuals. A limited adverse effect means that, for example, the loss of confidentiality, integrity, or

16、 availability, might:(i) cause a degradation ,degrde()n in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced; (ii) result in minorman damage to organizational assets; (iii) result

17、in minor financial loss; or (iv) result in minor harm to individuals.低级:低水平的损失可能会对机构的运行、机构资产或个体产生有限的不利影响;有限的不利影响,例如,保密性,完整性,可用性的损失,可能是:引起完成任务的能力的程度和持续时间有所退化,组织能够执行其主要功能,但功能性明显减少;导致少量组织资产损失;导致小的经济损失;或导致轻微的个人伤害。Moderate: The loss could be expected to have a serioussiris adverse effect on organizationa

18、l operations, organizational assets, or individuals. A serious adverse effect means that, for example, the loss might: (i) cause a significant degradation degrde()n in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness o

19、f the functions is significantly reduced; (ii) result in significant damage to organizational assets; (iii) result in significant financial loss; or (iv) result in significant harm to individuals that does not involve loss of life or serious, life-threatening injuries.中级:对机构的运行、机构资产或个体的有严重的不良效应。这些影响

20、就是,比如:引起完成任务的能力的程度和持续时间有很大退化,机构能够完成其主要功能,但是功能性显著降低。 导致重大机构资产的损失;导致重大经济损失;或者导致重大个人损失,这不涉及人身安全或者危及生命的伤害。 High: The loss could be expected to have a severesv or catastrophic adverse effect on organizational operations, organizational assets, or individuals. A severesv or catastrophic adverse effect mea

21、ns that, for example, the loss might: (i) cause a severesv degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions; (ii) result in major damage to organizational assets; (iii) result in major financial l

22、oss; or (iv) result in severe or catastrophic harm to individuals involving loss of life or serious, life-threatening injuries.高级:对机构的运行、机构资产或个体的有严重的或者灾难性的不利影响。这些严重的或者灾难性的负面影响,比如:引起完成任务能力的程度和持续时间按有严重的退化或丧失,机构不能够执行一个或者多个主要功能。导致更加重大机构资产的损失;导致更加重大经济损失;或者导致更加重大个人损失,这会涉及人身安全或者受到生命威胁的伤害。09一、The bookCrypto

23、graphy and Network Security: PRINCIPLES AND PRACTICE is organized into four broad categories,please give a introduction about the main areas covered. Answer:密码学与网络安全:原理与实践这本书可以分成四大类,请给出有关的主要领域及内容。回答:1) Cryptographic algorithms: This is the study of techniques for ensuring the secrecy and/or authenti

24、city of information. The three main areas of study in this category are: (1) symmetric encryption, (2) asymmetric encryption, and(3) cryptographic hash functions, with the related topics of message authentication codes and digital signatures.1)加密算法:这是保证信息的保密性和真实性的技术研究。这类研究的三个主要领域是:(1)对称加密(2)非对称加密(3)

25、加密哈希函数,和与相关的消息认证码和数字签名。2) Mutual trust: This is the study of techniques and algorithms for providing mutual trust in two main areas. First, key management and distribution deals with establishing trust in the encryption keys used between two communicating entities. Second, user authentication deals

26、with establishing trust in the identity of a communicating partner.3) Network security: This area covers the use of cryptographic algorithms in network protocols and network applications.4) Computer security: In this book, we use this term to refer to the security of computers against intruders (e.g

27、., hackers) and malicious software (e.g.,viruses). Typically, the computer to be secured is attached to a network, and the bulk of the threats arise from the network.2)交互互信:这是在两个主要领域提供相互信任技术和算法的研究。首先,密钥管理和分配是处理建立在两个通信实体之间使用加密密钥的信任。第二,用户认证是处理建立在通信伙伴的身份信任。3)网络安全:涵盖网络协议和网络应用的加密算法的使用。4)计算机安全:在这本书中,我们用这个

28、词来指计算机的安全防范入侵者(例如,黑客和恶意软件)(例如,病毒)。通常情况下,计算机安全和网络有关,计算机的大部分威胁都是来自网络。09二、Cryptographic algorithms have a broad range of applications and Internet security rely heavily on these cryptographic techniques. The cryptographic algorithms can be grouped into four main areas, please make an explanation about

29、these four sides .Answer:加密算法具有广泛的应用,互联网的安全性依赖于这些加密技术。加密算法可以分为四个主要领域,请对这四方面进行解释。Cryptographic algorithms and protocols can be grouped into four main areas:加密算法与协议可以分为四个主要领域:1) Symmetric encryption: Used to conceal the contents of blocks or streams of data of any size, including messages, files, encr

30、yption keys, and passwords. Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption. . If both sender and receiver use the same key, the system is referred to as symmetric, si

31、ngle-key, secret-key, or conventional encryption. key encryption in the 1970s. It remains by far the most widely used of the two types of1)对称加密:用来隐藏任何尺寸的数据块和数据流,包括消息、文件、加密密钥和密码。对称加密,也称为常规加密或单密钥加密,它是公共密钥加密技术被使用之前的唯一加密类型。如果发送方和接收方使用相同的密钥,该系统被称为对称的、单密钥、密钥、或常规加密。上世纪70年代密钥加密,它仍然是目前使用最广泛的两种类型之一。2) Asymmet

32、ric encryption: Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures. If the sender and receiver use different keys, the system is referred to as asymmetric, two-key, or public-key encryption. Asymmetric encryption is a form of cryptosystem in which encryption and decryption are performe

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1