搜题
网友您好,请在下方输入框内输入要搜索的题目:
搜题
题目内容 (请给出正确答案)
提问人:网友anonymity 发布时间:2022-01-07
[主观题]

Computer Security 计算机安全 The techniques developed to protect single computers and network-link

Computer Security

计算机安全

The techniques developed to protect single computers and network-linked computer systems from accidental or intentional harm are called computer security. Such harm includes destruction of computer hardware and software, physical loss of data, and the deliberate invasion of databases by unauthorized individuals.

Data may be protected by such basic methods as locking up terminals and replicating data in other storage facilities. More sophisticated methods include limiting data access by requiring the user to have an encoded card or to supply an identification number or passworD. Such procedures can apply to the computer data system as a whole or may be pinpointed for particular information banks or programs. Data are frequently ranked in computer files according to degree of confidentiality.

Operating systems and programs may also incorporate built in safeguards, and data may be encoded in various ways to prevent unauthorized persons from interpreting or even copying the material. The encoding system most widely used in the United States is the Data Encryption Standard (DES), designed by IBM and approved for use by the National Institute of Standards and Technology in 1976. DES involves a number of basic encrypting procedures that are then repeated several times. Very large scale computer systems, for example, the U. S. military Advanced Research Project Agency Network (ARPANET), may be broken up into smaller subsystems for security purposes, but smaller systems in government and industry are more prone to system-wide invasions. At the level of personal computers, security possibilities are fairly minimal.

Most invasions of computer systems are for international or corporate spying or sabotage, but computer hackers[1]may take the penetration of protected databanks as a challenge, often with no object in mind other than accomplishing a technological feat. Of growing concern is the deliberate implantation in computer programs of worms or viruses[2]that, if undetected, may progressively destroy databases and other software. Such infected programs have appeared in the electronic bulletin boards available to computer users. Other viruses have been incorporated into computer software sold commercially. No real protection is available against such bugs except the vigilance of manufacturer and user.

Anti-Virus Programs to the Rescue

There is a wide range of virus protection products available to combat the 11,000 known viruses that currently plague personal computers. These products range in technology from virus scanners to terminate and stay resident monitors, to integrity checkers to a combination of the three. Each of these techniques has its associated strengths and weaknesses.[3]

The most fundamental question that must be asked when considering and evaluating automated anti-virus tools is "how well does the product protect against the growing virus threat?" When developing a security program, companies must think long term. Not only must you choose a form of protection that can detect and safely eliminate today's varieties, but you must consider tomorrow's gully wash as well.[4]The real challenge lies in securing against the 38,000 new species that are expected to appear within the next two years. The 11,000 known viruses that have been documented to date represent what is only the tip of the iceberg in terms of what tomorrow will bring.

Virus Protection Methods

Today there exists three broad based categories of anti-virus techniques: scanners, memory resident monitors (TSRs), and integrity checkers.

Virus Scanners

Virus scanners are programs designed to examine a computer's boot block, system memory, partition table, and executable files,[5]looking for specific code patterns that are typical to known virus strains. Generally, a virus scanner is able to identify a virus by name and indicate where on the hard drive or floppy drive the infection has occurreD. Virus scanners are also able to detect a known virus before it is executeD. Virus scanners do a good job of detecting known viruses. They are generally able to find a virus signature if it is present and will identify the infected file and the virus. Some are faster than others, which is an advantage when checking a hard disk with thousands of files. But virus scanners have several major weaknesses.

First and foremost, scanners are completely ineffective against any virus whose code pattern is not recognizeD. In other words, scanners cannot identify a virus if they don't have a signature for it. Also, many of today's viruses are designed specifically to thwart scanners. These so-called stealth viruses know the correct file size and date for a program (i. e. , what they were before the virus infected them). They will intercept operations that ask for that information and return the pre-infection values, not the actual ones during a disk reaD. Some viruses can mutate slightly so that the original signature will be rendered ineffective against the new strain and can even result in file damage if recovery is based off virus signature assumptions. A new wave in virus authorship is the creation of self mutating viruses. These viruses infect a file in a different way each time, so it cannot be identified by a simple pattern search, rendering virus scanners ineffective.

Secondly, virus scanners are quickly rendered obsolete and require frequent, costly and time-consuming updates—which may be available only after serious damage has been done. The burden of constantly updating virus scanners, even if provided free of charge, can be a huge burden. In a corporate environment, where thousands of personal computers must be protected, simply distributing scanner updates in a timely and efficient manner and making sure they are installed is an enormous task.

I ntegrity Checkers

This is a relatively new approach, compared to scanners and monitors. Integrity checkers incorporate the principle modification detection. This technique safeguards against both known and unknown viruses by making use of complex file signatures and the known state of the computer environment rather than looking for specific virus signatures.

Each file has a unique signature (which is like a fingerprint-a unique identifier for that particular file) in the form of a CRC or a checksum. Changes in any character within the file will probably change the file's checksum. For a virus to spread, it must get into system memory and change some file or executable code.

An integrity checker will fingerprint and register all program files and various system parameters, such as the boot block, partition table, and system memory, storing this information in an on-line database. By recalculating the files checksum and comparing it to the original, integrity checkers can detect file changes that are indicative of a virus infection.

Industry experts agree that integrity checking is currently the only way to contend with tomorrow's growing virus threat. Since this methodology is non-reliant on virus signatures, it offers protection against all potential viruses, today's and tomorrow's.

Additionally, stealth viruses have historically been able to bypass integrity checkers. The only way users can be certain that their computer is 100 percent clean is to boot the system from a clean, DOS based disk and check the integrity of the information stored on this disk with the current state of the hard drive. Called the "Golden Rule" in virus protection, most integrity checkers fail to follow this security principle.

System Administrator

System Administrator, in computer science, is the person responsible for administering Use of a multiuser computer system, communications system, or both. A system administrator performs such duties as assigning user accounts and passwords, establishing security access levels, and allocating storage space, as well as being responsible for other tasks such as watching for unauthorized access and preventing virus or Trojan Horse[6]programs from entering the system. A related term, sysop (system operator), generally applies to a person in charge of a bulletin board system, although the distinction is only that a system administrator is associated with large systems owned by businesses and corporations, whereas a sysop usually administers a smaller, often home- based, system.

Hacker

Hacker, in computer science, originally, is a computerphile, a person totally engrossed in computer programming and computer technology. In the 1980s, with the advent of personal computers and dial up[7]computer networks, hackers acquired a pejorative connotation, often referring to someone who secretively invades others computers, inspecting or tampering with the programs or data stored on them. (More accurately, though, such a person would be called a cracker.) Hacker also means someone who, beyond mere programming, likes to take apart operating systems and programs to see what makes them tick.

Notes

[1]computer hackers:电脑黑客,指非法侵入他人计算机进行浏览或篡改程序或计算机上所存数据的人。

[2]Of growing concern is the deliberate implantation in computer programs of worms or viruses.越来越令人担心的是蓄意地把蠕虫程序或病毒植入计算机程序。

[3]These products range in technology from virus scanners to terminate and stay resident monitors,to integrity checkers to a combination of the three.Each of these techniques has its associated strengths and weaknesses.这些防病毒的产品从技术上有病毒扫描到内存驻留监督程序,从完整性检查到三者的结合程序,每一种有其相关的优点和缺点。

[4]gully wash:gully冲沟,檐槽。此处字面意义是“冲水槽”,可翻译成“但必须从长计议”或“考虑到未来的问题”。

[5]to examine a computer's boot block,system memory,partition table,and executable files:检查计算机的引导块、系统内存、分区表和可执行文件。

[6]Trojan Horse:特洛伊木马,一种欺骗程序。在计算机安全学中,一种计算机程序,表面上或实际上有某种有用功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。

[7]dial up:拨号呼叫,访问计算机的一种方法。计算机通过调制解调器连接到电话线路上,拨号上网。

Choose the best answer for each of the following:

简答题官方参考答案 (由简答题聘请的专业题库老师提供的解答)
查看官方参考答案
更多“Computer Security 计算机安全 The techniques developed to protect single computers and network-link”相关的问题
第1题
Learning the language of a country isn't enough.If you know the manners of your foreign friends, you will probably be surprised just how different they can be from your own.

A visitor to India should remember it is impolite there to use the left hand for passing food at the table.The left hand is for washing yourself.Also in India, you might see a man shaking his head at another to show that he is disagree ing.But in many parts of India a side-to-side movement of the head is to show agreement.In Bulgaria you shake your head to show "yes"—a nod shows "no".

In Europe it is quite usual to cross your legs while sitting and talking to someone, even at an impor tant meeting.But doing this could cause offence to a Thailander.Touching the head of a grown-up is also not done in Thailand.

Knowing about manners is useful when you are traveling, and you also need to know the language used to express the customs.

1.If you are staying in India, you'd better().

A.not use your left hand to pass food at the table

B.use your left hand to pass food at the table

C.not use your left hand to wash yourself

D.use your left hand at all times

2.To shake your h ead means “Yes” ().

A.in India

B.in Europe

C.in Bulgaria

D.in Thailand

3.You can easily make a Thailander angry by().

A.touching his head

B.crossing your legs while talking to him

C.shaking your head

D.nodding your head

4.The wri ter thinks that to know about a country well one must().

A.know the language of the country

B.know the manners of the country

C.know the manners better than the language

D.know both the language and the manners

5.We can learn from the passag e that().

A.different countries have different manners

B.the manners in Thailand are the same as those in India

C.one should be careful not to cross legs in Europe

D.one should not touch a grown-up's head in India

点击查看答案
第2题
A sudden report ______ like the sound of a car backfiring.
A.rang in

B.rang out

C.rang up

D.rang through

点击查看答案
第3题
Most people think of a camel as an obedient beast of burden, because it is best known for its ability to carry heavy loads across vast stretches of desert without requiring water.In reality, the camel is considerably more than just the Arabian equivalent of the mule.It also possesses a great amount of intelligence and sensitivity.

The Arabs assert that camels are so acutely aware of injustice and ill treatment that a camel owner ho punishes one of the beasts too harshly finds it difficult to escape the camel’s vengeance.Apparently, the animal will remember an injury and wait for an opportunity to get revenge.

In order to protect themselves form. the vengeful beasts, Arabian camel drivers have learned to trick their camels into believing they have achieved revenge.When an Arab realizes that he has excited a camel’s rage, he places his own garments on the ground in the animal’s path.He arranges the clothing so that it appears to cover a man’s body.When the camel recognizes its master’s clothing on the ground, it seizes the pile with its teeth, shakes the garments violently and tramples on them in a rage.Eventually, after its anger has died away, the camel departs, assuming its revenge is complete.Only then does the owner of the garments come out of hiding, safe for the time being, thanks to this clever ruse.

6.Which of the following is mentioned in this passage?

A.The camel never drinks water

B.The camel is always violent

C.The camel is very sensitive

D.The camel is rarely used anymore

7.It is implied in the passage that______.

A.the mule is a stupid and insensitive animal

B.the mule is as intelligent as the camel

C.the mule is an animal widely used in the desert

D.the mule is a vengeful animal

8.From this passage we can conclude that _______.

A.camels are generally vicious towards their owners

B.camels usually treat their owners well

C.camels don’t see very well

D.camels try to punish people who abuse them

9.The writer makes the camel’s vengeful behavior. clearer to the reader by presenting_______.

A.a well-planned argument

B.a large variety of examples

C.some eyewitness accounts

D.a typical incident

10.The main idea of the passage is __________.

A.camels can be as intelligent as their drivers

B.camels, sensitive to injustice, will seek revenge on those who harm them

C.camel drivers are often the targets of camels’ revenge

D.camels are sensitive creatures that are aware of injustice

点击查看答案
第4题
请阅读下面的材料,分析人工智能技术对新闻业的影响。人工智能(Artificialintelligence,缩写AI)
请阅读下面的材料,分析人工智能技术对新闻业的影响。

人工智能(Artificialintelligence,缩写AI)与自然智能(naturalintelligence,缩写NI)相对应,在计算机科学中,人工智能领域研究能根据环境处理信息的“智能主体”(intelligentagents)如何最优化决策的过程,涉及的子领域包括大数据、机器学习、图像识别、神经网络。通俗来说,人工智能就是指使机器具备人类的认知、学习、分析、解决问题的智能,因此也被称为机器智能(MachineIntelligence,缩写MI)。根据美联社公布《增强新闻的未来:智能机器时代新闻编辑室手册》(TheFutureofAugmentedJournalism:AGuideforNewsroomsintheAgeofSmartMachines),目前人工智能技术主要有“机器人写作”和“算法推荐”被广泛运用到新闻的生产和分发领域。

点击查看答案
第5题
The triple meltdown at the Fukushima Daiichi nuclear power plant in March 2011 created another living lab.
A.the sudden and complete failure of a company, organization, or system

B.severe overheating of the core of a nuclear reactor resulting in the core melting and radiation escaping

点击查看答案
第6题
The list of all accounts with their balances is the
A.balancesheet.

B.journal.

C.trialbalance

D.chartofaccounts.

点击查看答案
第7题
The underlying purpose of accounting is to provide () information for decision making about an economic entity.
A.production

B.marketing

C.financial

D.research and development

点击查看答案
第8题
The bishop helped __________ the sense of a community embracing all classes.
A、nourish

B、feed

C、pretend

D、foster

点击查看答案
第9题
__________ we are calculating is the instantaneous acceleration of the particle.

A、What

B、That

C、Which

D、/

点击查看答案
重要提示: 请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案
购买前请仔细阅读《购买须知》
请选择支付方式
微信支付
支付宝支付
点击支付即表示你同意并接受《服务协议》《购买须知》
立即支付
搜题卡使用说明

1. 搜题次数扣减规则:

功能 扣减规则
基础费
(查看答案)
加收费
(AI功能)
文字搜题、查看答案 1/每题 0/每次
语音搜题、查看答案 1/每题 2/每次
单题拍照识别、查看答案 1/每题 2/每次
整页拍照识别、查看答案 1/每题 5/每次

备注:网站、APP、小程序均支持文字搜题、查看答案;语音搜题、单题拍照识别、整页拍照识别仅APP、小程序支持。

2. 使用语音搜索、拍照搜索等AI功能需安装APP(或打开微信小程序)。

3. 搜题卡过期将作废,不支持退款,请在有效期内使用完毕。

请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

- 微信扫码关注简答题 -
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反简答题购买须知被冻结。您可在“简答题”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
- 微信扫码关注简答题 -
请用微信扫码测试
欢迎分享答案

为鼓励登录用户提交答案,简答题每个月将会抽取一批参与作答的用户给予奖励,具体奖励活动请关注官方微信公众号:简答题

简答题官方微信公众号

简答题
下载APP
关注公众号
TOP