Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES (2) An interception means that some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to obtain data in a network. While a loss may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception can be readily detected (2)截取是指某一非特许用户掌握了访问资源的权利。外界用户可以是一 个人、一个程序或一个计算机系统。这种威胁的例子如程序或数据文件 的非法拷贝,或私自接线入网去获取数据。数据丟失可能会很快被发现, 但很可能截取者并不留下任何容易检测的痕迹。 《什第机专出美语 10-11
Chapter 10 Computer and Network Security 计算机专业英语 10-11 10.1.2 KINDS OF SECURITY BREACHES (2) An interception means that some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to obtain data in a network. While a loss may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception can be readilydetected. (2)截取是指某一非特许用户掌握了访问资源的权利。外界用户可以是一 个人、一个程序或一个计算机系统。这种威胁的例子如程序或数据文件 的非法拷贝,或私自接线入网去获取数据。数据丢失可能会很快被发现, 但很可能截取者并不留下任何容易检测的痕迹。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
Chapter 10. Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES (3)If an unauthorized party not only accesses but tampers with an asset, the failure becomes a modification. For example, someone might modify the values in a data base alter a program so that it performs an additional computation, or modify data being transmitted electronically. It is even possible for hardware to be modified. Some cases of modification can be detected with simple measures, while other more subtle changes may be almost impossible to detect (3)如果非授权用户不仅可以访向问计算机资源,而且可以篡改资源,则威 胁就成为修改了。例如,某人可以修改数据库中的值,更换一个程序 以便完成另外的计算,或修改正在传送的数据,甚至还可能修改硬件 某些情况下可以用简单的测量手段检测出所做的修改,但某些微妙的 修改是不可能检测出来的。 不第机专语 0-12
Chapter 10 Computer and Network Security 计算机专业英语 10-12 10.1.2 KINDS OF SECURITY BREACHES (3) If an unauthorized party not only accesses but tampers with an asset, the failure becomes a modification. For example, someone might modify the values in a database, alter a program so that it performs an additional computation, or modify data being transmitted electronically. It is even possible for hardware to be modified. Some cases of modification can be detected with simple measures, while other more subtle changes may be almostimpossible to detect . (3)如果非授权用户不仅可以访问计算机资源,而且可以篡改资源,则威 胁就成为修改了。例如,某人可以修改数据库中的值, 更换一个程序, 以便完成另外的计算,或修改正在传送的数据, 甚至还 可能修改硬件。 某些情况下可以用简单的测量手段检测 出所做的修改,但某些微妙的 修改是不可能检测出来的。 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches