当前位置:首页 > 计算机网络安全与防范外文翻译文献
计算机网络安全与防范外文翻译文献
9
计算机网络安全与防范外文翻译文献
原文:
Security and Precaution On Computer Network
1.1 INTRODUCTION
The rapid development of computer technology has provided certain technological protection, which means computer application has infiltrated into various fields of society. At the same time, enormous progress and popularization of network technology has brought large economic profits to the society. However, ways to sabotage and attack computer information system has changed a lot under the network circumstance which gradually makes network security issues the mainstream of computer security.
1.2 NETWORK SECURITY
1.2.1 Concept and characteristics of computer network security.
Computer network security is considered to be a comprehensive subject that consists of various ones, including computer science, network technology, communication technology, information security technology, applied mathematics and information theory. As a systemic concept, network security is composed by physical security, software security, information security and circulation security. Essentially, network security means Internet information security. Generally speaking, relevant theory and technology on security, integration, availability, and controllability that is related to network information belong to research fields of computer network security. On the contrary, narrowly, \security\means security of relevant information on network, which is to protect the information secret and integration, avoiding illegal activities by using system security vulnerabilities made to wiretap, pretend, spoof and usurp. Above all, we can protect validated users' profits and privacy.
Computer network security is characterized by privacy, integrity, facticity, reliability, availability, non-repudiation and controllability.
Privacy refers to network information will not be leaked to non-authorized users, entities or procedures, but only for authorized users, for example, mails can merely be opened by addressees, anyone else are not allowed to do that privately. When transferring information with
10
计算机网络安全与防范外文翻译文献
network, privacy needs to be guaranteed. Positive solution might be made to encrypt management on information. Although one can intercept that, it's just insignificant Unicode without ay importance.
Integrity means network information can be kept not being modified, sabotaged and lost in the process of storage and transmission. Integrity guarantees facticity, which means if the information is checked by the third party or non-authorized person, the content, is still for real, not being changed. So keeping integrity is the basic requirement for information security.
Facticity points to reliability on information, mainly confirms identities of information owner and sender.
Reliability indicates that system can accomplish regulated functions with stated conditions and limited time. It's the basic aim for all network information system establishment and operation.
Availability shows that network information can be visited by authorized entities and be used according to their demand.
Non-repudiation requires all participants that can not deny or repudiate the finished operations and promises in the process of transferring information. One of the measures to deal with non-repudiation is to use digital signature technology.
Controllability directs at the ability of controlling network information transmission and content. For instance, illegal and unhealthy information are forbidden to transfer through public network.
1.3 Treats faced by computer network
There are various threats confronted by computer network: hostile attack, software leak, computer virus and natural disaster. 1.3.1 Hostile attack
Hostile attack is considered to be one of the serious threats for computer network. It's a man-made destruction with propose that can be divided into initiative attack and passive attack. Initiative attack aims to wreck network and information, usually using ways of modification, delete, falsifications, deception, virus and logical bombs. Once succeed, it could stop operation of network system, even a paralysis of overall system. Passive attack is to get information, which is usually conducted to steal secret information that on one is aware of, such as business and
11
计算机网络安全与防范外文翻译文献
trade secret, project plan, bid figures and personal information, without affecting regular operation. Hostile attack, both imitative and passive, could damage badly computer network, lead to leaks of confidential data, finally cause irreparable lost. 1.3.2 Software leak and backdoor (computing)
There are two kinds of software leaks: one is made by propose, which is intently designed to control system and steal information for the future use; the other one is accidentally made because of negligence or other technological elements by designers. However, the existence of these leas bought serious security hidden dangers to network. For example, for providing convenient access to the system developers without setting up entrance password for system operation will offer channels for hacker as well. When conducting operation system, some system processes are always waiting certain conditions, once the satisfied conditions appear the process will go on running, which can also be used by hackers. Otherwise, although have been kept for secrets, some backdoors (computing) set up by programmers for accommodating themselves will possibly bring large damages and lost if they are leaked out or found by others. 1.3.3 Damages to network security by computer virus
Computer virus is a specially programmed computer process that can be copied and transmitted through various channels, such as disk, CD and computer network. It was firstly discovered in 1980s, and up to now the figures have been to more than 10,000 around the world with high increasing. Meanwhile, the concealment, contamination and destruction are also further developed. With the rapid development of Internet, diffusion rate of computer virus has been accelerated largely, destructed greatly and contaminated heavily all over the world. This disaster had a serious influence on information system for every country and the whole world. About 63% of computers in America had been infracted by computer virus, and 9% of cases had caused more than US$100,000 damages, according to the research carried out by famous MIS Manages and Data Quest marketing company. In 1996, computer virus had damaged US$I 00,000,000 economic lost to American manufacturing industry. Internet has provided easy-diffused environment for computer virus, at the same time increased the difficulty in exterminating them. The transmission of computer virus not only produces network destruction, but also the leaks of network information. Computer virus has been a grave threat to network security, especially to the dedicated network.
12
共分享92篇相关文档