Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of security breaches 10.1.2 KINDS OF SECURITY BREACHES In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data. modification of data. or denial of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm 在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式; 暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机 脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。 《什第机专出美语 10-6
Chapter 10 Computer and Network Security 计算机专业英语 10-6 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or denial of legitimate access to computing . A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. 在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式; 暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机。 脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES a human who exploits a vulnerability perpetrates an attack on the system Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters inadvertent human errors and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnera bility. 人可利用脆弱性对系统进行罪恶的攻击。对计算机系统的威胁是引起安 全丧失或伤害的环境;人们的攻击是威胁的例子,如自然灾害,人作非 故意错误和硬件或软件缺陷等。最后,控制是一种保护性措施控制 可以是一种动作,一个设备,一个过程或一种技术减少了脆弱性 《什第机专出美语 10-7
Chapter 10 Computer and Network Security 计算机专业英语 10-7 10.1.2 KINDS OF SECURITY BREACHES A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnerability. 人可利用脆弱性对系统进行罪恶的攻击。对计算机系统的威胁是引起安 全丧失或伤害的环境;人们的攻击是威胁的例子,如自然灾害,人们非 故意错误和硬件或软件缺陷等。最后,控制是一种保护性措施——控制 可以是一种动作,一个设备,一个过程或一种技术——减少了脆弱性。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES The major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems. These four threats are shown in Fig. 10-1. 计算机系统的主要资源是硬件、软件和数据。有四种对计算机安 全的威胁:中断,截取,篡改和伪造。这四种威胁都利用了计算 机系统资源的脆弱性,图10-1表示这四种威胁。 《什第机专出美语 10-8
Chapter 10 Computer and Network Security 计算机专业英语 10-8 10.1.2 KINDS OF SECURITY BREACHES The major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems.These four threats are shown in Fig.10-1. 计算机系统的主要资源是硬件、软件和数据。有四种对计算机安 全的威胁:中断,截取,篡改和伪造。这四种威胁都利用了计算 机系统资源的脆弱性,图10-1表示这四种威胁。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
Chapter 10. Computer and Network Security Normal flow Interruption Interception Fabrication Modification Fig 10-1 Four classes of System Security Failures 《什第机专出美语 10-9
Chapter 10 Computer and Network Security 计算机专业英语 10-9 Fabrication Modification Normal Flow Interruption Interception Fig.10-1 Four classes of System Security Failures
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES (1) In an interruption, an asset of the system becomes lost or unavaila ble or unusa ble An example is malicious destruction of a hardware device, erasure of a program or data file, or failure of an operating system file manager so that it cannot find a particular disk file. 1)在中断情况下,系统资源开始丢失,不可用或不能用。例 如,蓄意破坏硬件设,抹除程序或数据文件或造成操作系 统的文件管理程序故障,以致不能找到某磁盘文件。 《什第机专出美语 0-10
Chapter 10 Computer and Network Security 计算机专业英语 10-10 10.1.2 KINDS OF SECURITY BREACHES (1) In an interruption, an asset of the system becomes lost or unavailable or unusable. An example is malicious destruction of a hardware device, erasure of a program or data file, or failure of an operating system file manager so that it cannot find a particular disk file. (1)在中断情况下,系统资源开始丢失,不可用或不能用。例 如,蓄意破坏硬件设备,抹除程序或数据文件或造成操作系 统的文件管理程序故障,以致不能找到某一磁盘文件。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches