計(jì)算機(jī)專業(yè)英語(yǔ)項(xiàng)目六_第1頁(yè)
計(jì)算機(jī)專業(yè)英語(yǔ)項(xiàng)目六_第2頁(yè)
計(jì)算機(jī)專業(yè)英語(yǔ)項(xiàng)目六_第3頁(yè)
計(jì)算機(jī)專業(yè)英語(yǔ)項(xiàng)目六_第4頁(yè)
計(jì)算機(jī)專業(yè)英語(yǔ)項(xiàng)目六_第5頁(yè)
已閱讀5頁(yè),還剩21頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

項(xiàng)目六InformationSecurity本項(xiàng)目主要講解了情報(bào)安全性的相關(guān)知識(shí),并具體從信息安全的概念和網(wǎng)絡(luò)安全這兩方面來進(jìn)行論述。目錄任務(wù)一ConceptofInformationSecurity任務(wù)二InternetSecurity1.信息安全1.ConceptofInformationSecurity準(zhǔn)備知識(shí)ReadingMaterial1ReadingMaterial13.正文參考翻譯信息安全

Theissueofinformationsecurityanddataprivacyisassumingtremendousimportanceamongglobalorganizations,particularlyinanenvironmentmarkedbycomputervirusandterroristattacks,hackingsanddestructionofvitaldataowingtonaturaldisasters.[1]Whenitcomestoinformationsecurity,mostcompaniesfallsomewherebetweentwoextremeboundaries:completeaccessandcompletesecurity.Acompletelysecurecomputerisonethatisnotconnectedtoanynetworkandphysicallyunreachablebyanyone.Acomputerlikethisisunusableanddoesnotservemuchofapracticalpurpose.Ontheotherhand,acomputerwithcompleteaccessisveryeasytouse,requiringnopasswordsorauthorizationtoprovideanyinformation.[2]Unfortunately,havingacomputerwithcompleteaccessisalsonotpracticalbecauseitwouldexposeeverybitofinformationpublicly,fromcustomerrecordstofinancialdocuments.Obviously,thereisamiddleground-thisistheartofinformationsecurity.1.ReadingMaterial1信息安全Wordsintegraladj.完整的,構(gòu)成整體所需要的assessv.估定,評(píng)定identifyv.識(shí)別,鑒別,確定forecastv.預(yù)測(cè)threatn.恐嚇,威脅draftv.起草doctrinen.教條,學(xué)說administrativeadj.管理的,行政的coordinaten.坐標(biāo)(用復(fù)數(shù))adj.同等的,并列的counteractv.抵消,中和,阻礙infrastructuren.下部構(gòu)造,基礎(chǔ)下部組織entrepreneurn.<法>企業(yè)家,主辦人certifyv.證明,保證1.ReadingMaterial1信息安全Theinformationsecuritysystemisanintegralpartofthenationalsecuritysystem.Themainfunctionsoftheinformationsecuritysystemare:assessingthestateofinformationsecurityinthecountry,identifyingandforecastinginternalandexternalthreatstoinformationsecurity,draftinganinformationsecuritydoctrine;developingacomprehensivesystemoflegal,administrative,economic.othermeasuresandmethodsaimedatensuringinformationsecurity;coordinatingandmonitoringtheworkofinformationsecurityentities;protectinginformationsecurityentitiesagainstplete,inaccurateanddistortedinformationandagainstexposuretoinformationdamagingtotheirlifeandhealth;protectingprotectedinformation;counteractingtechnicalintelligenceservices;developingandperfectinganinformationinfrastructure,aninformationtechnologyindustry,systems,meansandservices;cooperationinthesphereofinformationsecurity.1.ReadingMaterial1信息安全organizingscientificresearch,developingandimplementationofscientific,scientific-technicalprogrammesinthefieldofinformationsecurity;licensingtheactivitiesofcorporationsandindividualentrepreneursinthefieldofinformationsecurity;certifyinginformationsystemsandmeans,assessingandratingthecomplianceofinformationfacilitieswithinformationprotectionrequirements;stateinspectioninthefieldofinformationsecurity;creatingconditionsforpreservinganddevelopingintellectualpotentialintheinformationsphere;preventing,identifyingandsuppressingoffenceswhichareaimedathurtingtherightsandfreedomsofcorporationsandindividualsintheinformationsphere,prosecutingandtryingincourtperpetratorsofcrimesintheinformationsphere;carryingoutinternationalinformationsecurity.1.ReadingMaterial1信息安全DataSecurityTheDevelopmentofDataTransmissionInthetraditional,manualworkingenvironment,information(intheformoftexts,numbers,etc.)andmedium(suchaspaper)werecloselyintertwined.Longexperiencesintheirusageandtheapplicationofanti-counterfeittechnologyhavemadetraditionalformsofinformationverydifficulttoalter.Similarly,itwasalsodifficulttosendbogusinformationbyanimpersonator.Eventhosewhosucceededindoingsousuallywerediscoveredveryeasily.Intoday'sworldofinformationandtechnology,theInternetisrapidlychangingmanywayspeopledothings.Similarly,ithasalsointroducedmanymanagementproblems.Formanandinformationtointeract,thereisaneedtoestablishareliableinformationsystemworkingenvironmentinwhichwegrasp,distribute,storeandmanageinformation.Suchanenvironmentmustbeabletoprovideampleprotectionagainsttampering,stealing,delaying,transmissionbyfictitiousparties,denialofhavingfaxedadocument,illegalintrusionandthelike.Onlysocanwebuildastrongfoundationforaninformationsociety.2.ReadingMaterial2信息安全信息安全和數(shù)據(jù)保密的問題在全球的組織中非常重要,尤其在一個(gè)計(jì)算機(jī)病毒、恐怖分子、黑客攻擊以及自然災(zāi)害造成重要數(shù)據(jù)破壞的環(huán)境。涉及到信息安全,很多公司會(huì)處于兩種極端的邊界W完全訪問和完全安全。一個(gè)完全安全的計(jì)算機(jī)是這樣的,不連接任何網(wǎng)絡(luò),并且也不讓任何人接觸。像這樣的計(jì)算機(jī)是不能用的并且也沒有多少實(shí)際用途。另一方面,完全訪問的計(jì)算機(jī)容易使用,提供任何信息不需要密碼和權(quán)限。不幸的是,擁有完全訪問的計(jì)算機(jī)也是不實(shí)際的,因?yàn)樗鼤?huì)公開暴露每一點(diǎn)信息,從客戶記錄到財(cái)政文件。顯然可以有一個(gè)中間區(qū)域

這就是信息安全的技術(shù)。信息安全的概念集中于下面幾部分W完整性W收集和維護(hù)正確的信息并且避免惡意破壞。可用性W在需要的時(shí)候提供對(duì)信息的訪問。機(jī)密性W避免向未授權(quán)或不必要的人泄漏信息。安全的信息系統(tǒng)需要具有如下的特性W服務(wù)完整性.這是信息系統(tǒng)的一個(gè)特性,以保證信息系統(tǒng)具有有效性、可靠性、完整性和敏捷性。3.正文參考譯文信息安全任務(wù)實(shí)施信息安全和數(shù)據(jù)保密的問題在全球的組織中非常重要,尤其在一個(gè)計(jì)算機(jī)病毒、恐怖分子、黑客攻擊以及自然災(zāi)害造成重要數(shù)據(jù)破壞的環(huán)境下。任務(wù):

信息安全任務(wù)分析:理解牢記!信息安全的重要性不言而喻。安全的信息系統(tǒng)需要具有如下的特性W服務(wù)完整性.這是信息系統(tǒng)的一個(gè)特性,以保證信息系統(tǒng)具有有效性、可靠性、完整性和敏捷性。任務(wù):信息安全信息安全任務(wù)實(shí)施

[1]例句:WWhenitcomestoinformationsecurity,mostcompaniesfallsomewherebetweentwoextremeboundaries:completeaccessandcompletesecurity.分析:W本句是復(fù)合句。Whenitcomestoinformationsecurity是時(shí)間狀語(yǔ)從句。whenitcomestosth/doingsth。意為當(dāng)涉及到(做)某事物的情況、事情和問題時(shí)。譯文:W涉及到信息安全,很多公司會(huì)處于兩種極端的邊界W完全訪問和完全安全。[2]例句:WUnfortunately,havingacomputerwithcompleteaccessisalsonotpracticalbecauseitwouldexposeeverybitofinformationpublicly,fromcustomerrecordstofinancialdocuments.W本句是復(fù)合句,because引導(dǎo)原因狀語(yǔ)從句。句中unfortunately為評(píng)注性狀語(yǔ)。評(píng)注性狀語(yǔ)不是修飾i語(yǔ)或i語(yǔ)動(dòng)詞。而是對(duì)整個(gè)句子進(jìn)行說明或解釋,表明說話人對(duì)話語(yǔ)的看法或態(tài)度,通常位于句首并用逗號(hào)與句子|開。譯文:W遺憾的是,擁有完全訪問的計(jì)算機(jī)也是不實(shí)際的。因?yàn)樗鼤?huì)公開暴露每一點(diǎn)信息,從客戶記錄到財(cái)政文件。

2.網(wǎng)絡(luò)安全2.InternetSecurityl準(zhǔn)備知識(shí)ReadingMaterial1ReadingMaterial23.正文參考翻譯Inrecentyears,Internetchangesourlifealot.Weusee-mailandInternetphonetotalkwithourfriends,wegetup-to-dateinformationthroughwebandwedoshoppinginthecyber-market.Internethasmanyadvantagesovertraditionalcommunicationchannels,e.g.it'scosteffective,itdeliversinformationfastanditisnotrestrictedbytimeandplace.[1]ThemorepeopleuseInternet,themoreconcernsaboutInternetsecurity.Inperson-to-personcommunity,securityisbasedonphysicalcues.Tonamebutafew,weuseoursignaturetoauthenticateourselves;wesealletterstopreventothersinspectionandmodification;wereceivereceiptwiththeshop'schoptomakesurewepaid;wegetinformationfromareliablesource.ButintheInternetsociety,nosuchphysicalcueisavailable.TherearetwoareasthatweconcernaboutinInternetcommunication.Thefirstoneissecrecyhowdoweensurenoonereadsthedataduringitstransmission?Thesecondoneisauthenticationhowdowebesurethattheidentityofsomeoneclaiming"whoitis".Imagineonedayyoureceiveane-mail,whichthee-mailsenderis"BillGates".Howdoyouconfirmthee-mailisactuallysentbyBillGates?1.ReadingMaterial1網(wǎng)絡(luò)安全1.ReadingMaterial1網(wǎng)絡(luò)安全authenticatev.鑒別

authenticationn.證明,鑒定

applicantn.申請(qǐng)者,請(qǐng)求者

cyber-marketn.網(wǎng)上商店

cryptographyn.密碼系統(tǒng),密碼術(shù)

certificaten.證書

counterpartn.副本,配對(duì)物

cooperationn.合作,協(xié)作

decryptv.解密,解釋明白

encryptionn.加密術(shù),密碼術(shù)

identificationn.辨認(rèn),鑒定,證明

receiptn.收據(jù),收條

signaturen.簽名

scenarion.情況說明,游戲的關(guān)或是某一特定情節(jié)

tokenn.令牌

trustworthya.可信賴的

up-to-datea.最近的,當(dāng)代的

Adistrustednetwork.InthecaseofconnectionstotheInternetthisconcernmaybebasedlargelyonanecdotalevidencegleanedfromwidespreadmediacoverageofsecuritybreaches.Acloserinspectionofthefactsandstatisticsbehindsomeofthemediacoveragewill,however,onlyservetodeepenthatconcern.Forexample,theUSNationalComputerSecurityAgency(NCSA)assertsthatmostattackstocomputersystemsgoundetectedandunreported,citingattacksmadeagainst9,000DepartmentofDefencecomputersbytheUSDefenceInformationSystemsAgency(DISA).Theseattackshadan88percentsuccessrateandwentundetectedbymorethan95percentofthetargetorganizations.Only5percentofthe5percentthatdetectedanattack,amere22sites,reactedtoit.ItisnoteworthythatthesesitesbelongtotheUSDepartmentofDefence(DoD)andwerenotcommercialsites,whichmaygivesecuritylessprioritythantheDoD.1.ReadingMaterial1網(wǎng)絡(luò)安全Apacketfilterisoftenusedtoprotectanorganization'scomputersandnetworksfromunwantedInternettraffic.ThefilterisplacedintherouterthatconnectstheorganizationtotherestoftheInternet.ApacketfilterconfiguredtoprotectanorganizationagainsttrafficfromtherestoftheInternetiscalledanInternetfirewall;thetermisderivedfromthefireproofphysicalboundaryplacedbetweentwostructurestopreventfirefrommovingbetweenthem.Likeaconventionalfirewall,anInternetfirewallisdesignedtokeepproblemsintheInternetfromspreadingtoanorganization'scomputers.Firewallsarethemostimportantsecuritytoolusedtohandlenetworkconnectionsbetweentwoorganizationsthatdonottrusteachother.Byplacingafirewalloneachexternalnetworkconnection,anorganizationcandefineasecureperimeterthatpreventsoutsidersfrominterferingwiththeorganization'scomputers.Inparticular,bylimitingaccesstoasmallsetofcomputers,afirewallcanpreventoutsidersfromprobingallcomputersinanorganizationorfloodingtheorganization'snetworkwithunwantedtraffic.2.ReadingMaterial2網(wǎng)絡(luò)安全近幾年來,Internet使人們的生活改變了許多。人們使用e-mail,通過IP電話和朋友交談,從網(wǎng)上獲取最新信息,在網(wǎng)絡(luò)市場(chǎng)購(gòu)物。與傳統(tǒng)通信渠道相比,Internet有許多優(yōu)勢(shì)W花費(fèi)實(shí)在,信息傳送速度快,并且不受時(shí)間和地點(diǎn)的限制。使用Internet的人越多,對(duì)Internet安全的關(guān)注就越多。在個(gè)人面對(duì)個(gè)人的社會(huì),安全取決于物理的提示。簡(jiǎn)單說來,人們用簽名來表明自己的身份:人們把信函密封起來,防止他人窺視和更改:人們接受商店里有公章的收條來證明己經(jīng)付款:人們從可靠的地方獲取信息。不過對(duì)Internet安全而言,就沒有這樣的物理提示。對(duì)Internet通信,人們關(guān)心兩個(gè)方面,第一是保密如何確信數(shù)據(jù)在傳輸過程中沒有人閱讀過?第二是鑒定如何確信某個(gè)人(或計(jì)算機(jī))所聲稱的身份。設(shè)想有一天用戶收到了一份e-mail,寄件人是"比爾·蓋茨",用戶如何確認(rèn)這份e-mail真的是比爾·蓋茨發(fā)送的?3.正文參考譯文網(wǎng)絡(luò)安全解決數(shù)據(jù)安全問題的途徑是加密。在現(xiàn)實(shí)生活中,如果湯姆想和瑪麗密談,他可以找一間沒人的房子和瑪麗平靜地交談,或者他用只有他們兩人明白的密碼交談。在互Interne

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論