登陆注册
27082000000078

第78章 Computer Security(8)

In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or denial of legitimate access to computing. Vulnerability is a weakness in the security system that might be exploited to cause loss or harm. A human who exploits vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software flaws. Finally, control is a protective measure--an action, a device, a procedure, or a technique--that reduces vulnerability.

The major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems.

(1) In an interruption, an asset of the system becomes lost or unavailable or unusable. An example is malicious destruction of a hardware device, erasure of a program or data file, or failure of an operating system file manager so that it cannot find a particular disk file.

(2) An interception means that some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to obtain data in a network. While a loss may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception can be readily detected.

(3) If an unauthorized party not only accesses but tampers with an asset, the failure becomes a modification. For example, someone might modify the values in a database, alter a program so that it performs an additional computation, or modify data being transmitted electronically. It is even possible for hardware to be modified. Some cases of modification can be detected with ****** measures, while other more subtle changes may be almost impossible to detect.

(4) Finally, an unauthorized party might fabricate counterfeit objects for a computing system. The intrude may wish to add spurious transactions to a network communication system, or add records to an existing database. Sometimes these additions can be detected as forgeries, but if skillfully done, they are virtually indistinguishable from the real thing.

【Vocabulary】

disclosure

n. 揭发,败露,败露的事情

modification

n. 更改,修正,修改

legitimate

adj. 合法的,合理的,正统的

vulnerability

n. 弱点,攻击

perpetrate

v. 做,犯(坏事,过失等)

circumstance

n. 环境,详情,境况

inadvertent

adj. 不注意的,疏忽的

flaw

n. 缺点,裂纹,瑕疵

interception

n. 中途夺取,拦截,侦听

modification

n. 更改,修改,更正

asset

n. 资产,有用的东西

fabrication

n. 制作,构成,伪造物

illicit

adj. 违法的

interceptor

n. 拦截机

forgery

n. 伪造物,伪造罪,伪造

indistinguishable

adj. 不能识别的,不能区别的

【参考译文】

破坏安全的类型

在计算机系统中,泄露是一种可能使安全丧失或受到伤害的形式;泄露的例子是非授权的数据的公开、数据的修改或者是拒绝合法的计算机访问。脆弱性是安全系统中的弱点,它可能引起安全的丧失或伤害,以及利用其弱点对系统进行人为的恶意攻击。对计算机系统的威胁是引起安全丧失或伤害的环境;攻击是威胁的例子,像自然灾害、疏忽和硬件或软件缺陷等也都是对计算机系统的威胁。最后,控制是一种保护性措施(它可以是一种动作、一个设备、一个过程或一种技术),可以减少脆弱性。

计算机系统的主要资源是硬件、软件和数据。有4种对计算机系统安全的威胁:中断、截取、修改和伪造。这4种威胁都利用了计算机系统资源的脆弱性。

(1)在中断的情况下,系统资源可能丢失,不可用或不能用。例如,蓄意破坏硬件设备,删除程序或数据文件,操作系统的文件管理程序出现故障,以至不能找到某一特定的磁盘文件。

(2)截取是指某一非特许用户掌握了访问资源的权利。外界用户可以是一个人、一个程序或一个计算机系统。这种威胁的例子如程序或数据文件的非法拷贝,以及窃取网络上的数据。数据丢失可能会很快被发现,但很可能截取者并不留下任何容易检测的痕迹。

(3)如果非授权用户不仅可以访问计算机资源,而且可以篡改资源,那么这种破坏就称为修改了。例如,某人可以修改数据库中的值,更换一个程序,以便完成另外的计算,或修改正在传送的电子数据,它甚至还可能修改硬件。

某些情况下可以用简单的措施检测出所做的修改,但是许多微妙的修改几乎是不可能被检测出来的。

(4)最后,非授权用户可以伪造计算机系统的一些对象。入侵者妄图向网络通信系统加入伪造的事务处理业务,或向现有的数据库中添加记录。有时,这些增加的数据可作为伪造品被检测出来,但是如果做得很巧妙,这些数据实际上无法与真正的数据区别开。

【Reading Material】

How do you deal with Internet fraud?

Summary

Internet fraud should be addressed as two specific issues: fraud that uses Internet technology as an integral part of the fraud; fraud that is already taking place by other means and the Internet is merely another method of delivery.

Methods exist that stop fraudsters misusing the technology, which can be rapidly implemented, but factors such as industry acceptance and concerns over potential liability if previous security claims could be claimed to be inaccurate will delay introduction. Much effort is spent promoting logos and confusing self-regulation, and trying to catch fraudsters, whilst the adoption of formal standards and accreditation for security (such as ISO 17799) are only starting to take place.

New Internet environment crimes may exist, such as defrauding machines or causing business harm by denial of service or virus attacks, and these will require social and legal steps to address them. However, the Internet has provided the fraudster with access to a significantly bigger market than ever before and effort will be required to create an environment where fraud is resisted by design rather than by insurance.

Introduction

Internet fraud is said to be big business. But what is it, and does using the Internet create the fraud, or is the Internet just a different way of delivering traditional fraud.

Fraud is essentially persuading someone of something with intent to deceive, perhaps with criminal intent. The deceit may be to persuade you to part with money, goods, services, rights or information.

For the purposes of this paper we are not going to examine methods of fraud, but look at the general techniques, how they are applied, and how, if at all, the Internet can be used to make those techniques easier for the criminal to use either to carry out a fraud or to escape detection.

General techniques of fraud

The key to fraud is to persuade you that something is real, when in fact it is not. Once you accept that the fake is real then the fraud can take place--whatever it is.

同类推荐
  • Chinesekungfu

    Chinesekungfu

    Wushu,theChinesemartialartformknownaskungfuintheWest,isavaluableculturalheritageofChinesepeopleandcontributiontohumancivilization.Wushu,oftenusedintheformofcombat,consistsofseveraldifferentkindsofmovements.
  • 汉英英语谚语手册

    汉英英语谚语手册

    英语谚语是以英国本土的民间谚语为主体(包括《圣经》、莎士比亚、培根等),引用了部分外来格言(如《伊索寓言》以及意大利、法国、印度等国格言)而组成的,所以内容丰富、贴切生活,更重要的是,在悠久的历史长河中,英语谚语是广大劳动人民思想、感情和智慧的结晶。
  • 双语学习丛书-财富精英

    双语学习丛书-财富精英

    流淌心灵的隽语,记忆的箴言,在双语的世界里,感受英语学习的乐趣,体会英语学习的奥妙,提高英语学习的能力!丛书包括:爱的交融、财富精英、成长课堂、醇香母爱、父爱如山、故乡情怀、节日趣闻、快乐心语、浪漫往昔等故事。
  • CraftworksofChina

    CraftworksofChina

    ThefolkhandicraftartsofChinaareanimportantpartofancientChinesecultureandarts.Theyarecharacterizedbylonghistory,wide-rangingelements,manyvarieties,anduniquestyles.
  • 英语PARTY——纯正口语对话室

    英语PARTY——纯正口语对话室

    本套书籍带你领略英语世界风景,感悟英语学习氛围,有助于英语学习。
热门推荐
  • 星空纪年

    星空纪年

    这是史诗,这是歌剧,这是命运,这是战争,如何能在星空之中追随自己的心,在这无限大的世界中随意畅游,与命运抗争,与世界为敌,只为了自己。
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 雾隐忍者传

    雾隐忍者传

    开局一个破土豆,技能装备全靠捡!一个大学刚毕业的年轻人,在和朋友沙滩上庆祝毕业聚餐时,醒来发现自己来到一个陌生的忍者世界。误打误撞在雾隐村结识了辉夜君麻吕,两人逃出水之国后,辗转来到茶之国,又和土蜘蛛萤邂逅,一起结伴到火之国木叶村。自此在尔虞我诈的忍者世界里展开属于自己的传奇故事。
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 你执念我好不好

    你执念我好不好

    人总需要执念,不过也不能执念太深。不然反倒成了牵绊。如果你的执念不在了,那就来执念我吧。每个人的成长过程结果都不同,别担心,路上我陪着你。两个互相自以为是大人的小朋友一起成长的故事。(谁说二十多岁就算不上小朋友啦。)
  • 斗罗之宇智波鼬之穿越

    斗罗之宇智波鼬之穿越

    斗罗之宇智波鼬穿越到圣魂村,并发誓一定要保护好这一个弟弟……
  • 空间重生豪门弃妇

    空间重生豪门弃妇

    21世纪的农业技术专家因车祸而死重生到未来世界。神马?我是豪门生活里被抛弃的一下堂妇?神马?和我一起被赶的还有一个三岁还不会说话的儿子?神马?被骂是丑八怪,弱智?我擦,女主空间在手,修炼异能,改变形象,养大儿子,虐死渣夫,调戏美男。大家走过路过不要错过,美女便宜卖咯,买一送一哦,某个腹黑小正太举着喇叭大喊。文文轻松搞笑,欢迎大家前来围观。
  • 青年电影手册:100位华语导演的诞生

    青年电影手册:100位华语导演的诞生

    封面人物为贾樟柯和赵薇,2013年对于他们是难忘的一年。2013年贾樟柯获得戛纳电影节最佳编剧奖;2013年赵薇以7亿票房成为中国电影史单片票房最高的女导演,并获得29届金鸡奖导演处女奖。100位华语导演,他们是最艺术的,也是最先锋的;他们是最商业的,也是最新锐的。首次聚焦华语电影导演的处女作,去聆听他们的故事,去探究他们的第一次源于什么样的渴望。第一次,也许没有经验,但是有足够的激情。他们寻找,他们探索,他们历险,100位导演,100部处女作,100种不同电影道路的开启,却又殊途同归,他们都是诞生在光影之中的追梦人。以虔诚和谦卑之心,向梦想致敬!
  • 大时代的熔炼

    大时代的熔炼

    在脱贫攻坚的大时代,一群理想坚定的乡镇干部、村干部、工作队和大学生用自己的信念在一个偏远的山村中演绎出一条精彩生动的扶贫发展之路。随着一系列的改革工作重心下移和脱贫攻坚工作的推进乡镇工作压力越来越大,再加上大量的历史遗留问题的爆发,乡村干部的工作环境就象一个大熔炉。随着公务员体制改革乡镇干部必须得安心留守乡村,相当于熔炉盖上了盖子。在熔炼中一群镇村干部,坚守初心牢记使命,坚定地守护群众利益。顶着压力成功地发展一方经济,带领群众走向致富之路,谱写出新时代的篇章......
  • 仙路之创仙

    仙路之创仙

    起点搜索灭世龙王,带给你们一个全新的世界