s Computer English Chapter 10 Computer and Network Security
Computer English Chapter 10 Computer and Network Security
2 Chapter 10. Computer and Network Security Key points useful terms and definitions of computer security Difficult points distinguish between four kinds of computer security breaches 《什第机专出美语 10-2
Chapter 10 Computer and Network Security 计算机专业英语 10-2 Key points: useful terms and definitions of computer security Difficult points: distinguish between four kinds of computer security breaches
2 Chapter 10. Computer and Network Security Requirements: 1. Principle of easiest penetration 2. The kinds of computer security breaches 3. What is firewall 4.了解科技论文标题的写法 《什第机专出美语 103
Chapter 10 Computer and Network Security 计算机专业英语 10-3 Requirements: 1. Principle of easiest penetration 2. The kinds of computer security breaches 3. What is firewall 4. 了解科技论文标题的写法
Chapter 10. Computer and Network Security 10. 1 Characteristics of Computer Intrusion and Kinds of Security Breaches New Words Expressions breach破坏,缺口 involve包含,涉及,也可不译 depositor寄托者 vulnerability弱点,攻击 perimeter周围,周边 penetrate vt.攻破,攻击 Exposure曝光,揭露 threat n.威胁,恐吓 asset资产 interruption中断,打断 interception截取 modification修改 fabricate v.伪造 tamper 篡改 spurious adj.假的 Abbreviations: 计算机专业英语 104
Chapter 10 Computer and Network Security 计算机专业英语 10-4 New Words & Expressions: breach 破坏,缺口 involve 包含,涉及,也可不译 depositor 寄托者 vulnerability 弱点,攻击 perimeter 周围,周边 penetrate vt. 攻破,攻击 Exposure 曝光,揭露 threat n. 威胁,恐吓 asset 资产 interruption 中断,打断 interception 截取 modification 修改 fabricate v. 伪造 tamper v. 篡改 spurious adj. 假的 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches Abbreviations:
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.1入侵计算机的特点 Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed 最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不 可能是最常用的,也不可能是针对己经釆取了最可靠的防范措施的方法。 This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are 这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强 了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻 击的方法是什么。和解 10-5
Chapter 10 Computer and Network Security 计算机专业英语 10-5 10.1.1 入侵计算机的特点 Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed. 最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不 可能是最常用的,也不可能是针对已经采取了最可靠的防范措施的方法。 This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are. 这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强 了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻 击的方法是什么。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches