云题海 - 专业文章范例文档资料分享平台

当前位置:首页 > 计算机网络安全与防范外文翻译文献

计算机网络安全与防范外文翻译文献

  • 62 次阅读
  • 3 次下载
  • 2025/6/18 11:39:07

计算机网络安全与防范外文翻译文献

9

计算机网络安全与防范外文翻译文献

原文:

Security and Precaution On Computer Network

1.1 INTRODUCTION

The rapid development of computer technology has provided certain technological protection, which means computer application has infiltrated into various fields of society. At the same time, enormous progress and popularization of network technology has brought large economic profits to the society. However, ways to sabotage and attack computer information system has changed a lot under the network circumstance which gradually makes network security issues the mainstream of computer security.

1.2 NETWORK SECURITY

1.2.1 Concept and characteristics of computer network security.

Computer network security is considered to be a comprehensive subject that consists of various ones, including computer science, network technology, communication technology, information security technology, applied mathematics and information theory. As a systemic concept, network security is composed by physical security, software security, information security and circulation security. Essentially, network security means Internet information security. Generally speaking, relevant theory and technology on security, integration, availability, and controllability that is related to network information belong to research fields of computer network security. On the contrary, narrowly, \security\means security of relevant information on network, which is to protect the information secret and integration, avoiding illegal activities by using system security vulnerabilities made to wiretap, pretend, spoof and usurp. Above all, we can protect validated users' profits and privacy.

Computer network security is characterized by privacy, integrity, facticity, reliability, availability, non-repudiation and controllability.

Privacy refers to network information will not be leaked to non-authorized users, entities or procedures, but only for authorized users, for example, mails can merely be opened by addressees, anyone else are not allowed to do that privately. When transferring information with

10

计算机网络安全与防范外文翻译文献

network, privacy needs to be guaranteed. Positive solution might be made to encrypt management on information. Although one can intercept that, it's just insignificant Unicode without ay importance.

Integrity means network information can be kept not being modified, sabotaged and lost in the process of storage and transmission. Integrity guarantees facticity, which means if the information is checked by the third party or non-authorized person, the content, is still for real, not being changed. So keeping integrity is the basic requirement for information security.

Facticity points to reliability on information, mainly confirms identities of information owner and sender.

Reliability indicates that system can accomplish regulated functions with stated conditions and limited time. It's the basic aim for all network information system establishment and operation.

Availability shows that network information can be visited by authorized entities and be used according to their demand.

Non-repudiation requires all participants that can not deny or repudiate the finished operations and promises in the process of transferring information. One of the measures to deal with non-repudiation is to use digital signature technology.

Controllability directs at the ability of controlling network information transmission and content. For instance, illegal and unhealthy information are forbidden to transfer through public network.

1.3 Treats faced by computer network

There are various threats confronted by computer network: hostile attack, software leak, computer virus and natural disaster. 1.3.1 Hostile attack

Hostile attack is considered to be one of the serious threats for computer network. It's a man-made destruction with propose that can be divided into initiative attack and passive attack. Initiative attack aims to wreck network and information, usually using ways of modification, delete, falsifications, deception, virus and logical bombs. Once succeed, it could stop operation of network system, even a paralysis of overall system. Passive attack is to get information, which is usually conducted to steal secret information that on one is aware of, such as business and

11

计算机网络安全与防范外文翻译文献

trade secret, project plan, bid figures and personal information, without affecting regular operation. Hostile attack, both imitative and passive, could damage badly computer network, lead to leaks of confidential data, finally cause irreparable lost. 1.3.2 Software leak and backdoor (computing)

There are two kinds of software leaks: one is made by propose, which is intently designed to control system and steal information for the future use; the other one is accidentally made because of negligence or other technological elements by designers. However, the existence of these leas bought serious security hidden dangers to network. For example, for providing convenient access to the system developers without setting up entrance password for system operation will offer channels for hacker as well. When conducting operation system, some system processes are always waiting certain conditions, once the satisfied conditions appear the process will go on running, which can also be used by hackers. Otherwise, although have been kept for secrets, some backdoors (computing) set up by programmers for accommodating themselves will possibly bring large damages and lost if they are leaked out or found by others. 1.3.3 Damages to network security by computer virus

Computer virus is a specially programmed computer process that can be copied and transmitted through various channels, such as disk, CD and computer network. It was firstly discovered in 1980s, and up to now the figures have been to more than 10,000 around the world with high increasing. Meanwhile, the concealment, contamination and destruction are also further developed. With the rapid development of Internet, diffusion rate of computer virus has been accelerated largely, destructed greatly and contaminated heavily all over the world. This disaster had a serious influence on information system for every country and the whole world. About 63% of computers in America had been infracted by computer virus, and 9% of cases had caused more than US$100,000 damages, according to the research carried out by famous MIS Manages and Data Quest marketing company. In 1996, computer virus had damaged US$I 00,000,000 economic lost to American manufacturing industry. Internet has provided easy-diffused environment for computer virus, at the same time increased the difficulty in exterminating them. The transmission of computer virus not only produces network destruction, but also the leaks of network information. Computer virus has been a grave threat to network security, especially to the dedicated network.

12

搜索更多关于: 计算机网络安全与防范外文翻译文献 的文档
  • 收藏
  • 违规举报
  • 版权认领
下载文档10.00 元 加入VIP免费下载
推荐下载
本文作者:...

共分享92篇相关文档

文档简介:

计算机网络安全与防范外文翻译文献 9 计算机网络安全与防范外文翻译文献 原文: Security and Precaution On Computer Network 1.1 INTRODUCTION The rapid development of computer technology has provided certain technological protection, which means computer application has infiltrated into various fields of society. At the same time, enormous progress and popularization of netwo

× 游客快捷下载通道(下载后可以自由复制和排版)
单篇付费下载
限时特价:10 元/份 原价:20元
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219
Copyright © 云题海 All Rights Reserved. 苏ICP备16052595号-3 网站地图 客服QQ:370150219 邮箱:370150219@qq.com