登陆注册
27082000000078

第78章 Computer Security(8)

In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or denial of legitimate access to computing. Vulnerability is a weakness in the security system that might be exploited to cause loss or harm. A human who exploits vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software flaws. Finally, control is a protective measure--an action, a device, a procedure, or a technique--that reduces vulnerability.

The major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems.

(1) In an interruption, an asset of the system becomes lost or unavailable or unusable. An example is malicious destruction of a hardware device, erasure of a program or data file, or failure of an operating system file manager so that it cannot find a particular disk file.

(2) An interception means that some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to obtain data in a network. While a loss may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception can be readily detected.

(3) If an unauthorized party not only accesses but tampers with an asset, the failure becomes a modification. For example, someone might modify the values in a database, alter a program so that it performs an additional computation, or modify data being transmitted electronically. It is even possible for hardware to be modified. Some cases of modification can be detected with ****** measures, while other more subtle changes may be almost impossible to detect.

(4) Finally, an unauthorized party might fabricate counterfeit objects for a computing system. The intrude may wish to add spurious transactions to a network communication system, or add records to an existing database. Sometimes these additions can be detected as forgeries, but if skillfully done, they are virtually indistinguishable from the real thing.

【Vocabulary】

disclosure

n. 揭发,败露,败露的事情

modification

n. 更改,修正,修改

legitimate

adj. 合法的,合理的,正统的

vulnerability

n. 弱点,攻击

perpetrate

v. 做,犯(坏事,过失等)

circumstance

n. 环境,详情,境况

inadvertent

adj. 不注意的,疏忽的

flaw

n. 缺点,裂纹,瑕疵

interception

n. 中途夺取,拦截,侦听

modification

n. 更改,修改,更正

asset

n. 资产,有用的东西

fabrication

n. 制作,构成,伪造物

illicit

adj. 违法的

interceptor

n. 拦截机

forgery

n. 伪造物,伪造罪,伪造

indistinguishable

adj. 不能识别的,不能区别的

【参考译文】

破坏安全的类型

在计算机系统中,泄露是一种可能使安全丧失或受到伤害的形式;泄露的例子是非授权的数据的公开、数据的修改或者是拒绝合法的计算机访问。脆弱性是安全系统中的弱点,它可能引起安全的丧失或伤害,以及利用其弱点对系统进行人为的恶意攻击。对计算机系统的威胁是引起安全丧失或伤害的环境;攻击是威胁的例子,像自然灾害、疏忽和硬件或软件缺陷等也都是对计算机系统的威胁。最后,控制是一种保护性措施(它可以是一种动作、一个设备、一个过程或一种技术),可以减少脆弱性。

计算机系统的主要资源是硬件、软件和数据。有4种对计算机系统安全的威胁:中断、截取、修改和伪造。这4种威胁都利用了计算机系统资源的脆弱性。

(1)在中断的情况下,系统资源可能丢失,不可用或不能用。例如,蓄意破坏硬件设备,删除程序或数据文件,操作系统的文件管理程序出现故障,以至不能找到某一特定的磁盘文件。

(2)截取是指某一非特许用户掌握了访问资源的权利。外界用户可以是一个人、一个程序或一个计算机系统。这种威胁的例子如程序或数据文件的非法拷贝,以及窃取网络上的数据。数据丢失可能会很快被发现,但很可能截取者并不留下任何容易检测的痕迹。

(3)如果非授权用户不仅可以访问计算机资源,而且可以篡改资源,那么这种破坏就称为修改了。例如,某人可以修改数据库中的值,更换一个程序,以便完成另外的计算,或修改正在传送的电子数据,它甚至还可能修改硬件。

某些情况下可以用简单的措施检测出所做的修改,但是许多微妙的修改几乎是不可能被检测出来的。

(4)最后,非授权用户可以伪造计算机系统的一些对象。入侵者妄图向网络通信系统加入伪造的事务处理业务,或向现有的数据库中添加记录。有时,这些增加的数据可作为伪造品被检测出来,但是如果做得很巧妙,这些数据实际上无法与真正的数据区别开。

【Reading Material】

How do you deal with Internet fraud?

Summary

Internet fraud should be addressed as two specific issues: fraud that uses Internet technology as an integral part of the fraud; fraud that is already taking place by other means and the Internet is merely another method of delivery.

Methods exist that stop fraudsters misusing the technology, which can be rapidly implemented, but factors such as industry acceptance and concerns over potential liability if previous security claims could be claimed to be inaccurate will delay introduction. Much effort is spent promoting logos and confusing self-regulation, and trying to catch fraudsters, whilst the adoption of formal standards and accreditation for security (such as ISO 17799) are only starting to take place.

New Internet environment crimes may exist, such as defrauding machines or causing business harm by denial of service or virus attacks, and these will require social and legal steps to address them. However, the Internet has provided the fraudster with access to a significantly bigger market than ever before and effort will be required to create an environment where fraud is resisted by design rather than by insurance.

Introduction

Internet fraud is said to be big business. But what is it, and does using the Internet create the fraud, or is the Internet just a different way of delivering traditional fraud.

Fraud is essentially persuading someone of something with intent to deceive, perhaps with criminal intent. The deceit may be to persuade you to part with money, goods, services, rights or information.

For the purposes of this paper we are not going to examine methods of fraud, but look at the general techniques, how they are applied, and how, if at all, the Internet can be used to make those techniques easier for the criminal to use either to carry out a fraud or to escape detection.

General techniques of fraud

The key to fraud is to persuade you that something is real, when in fact it is not. Once you accept that the fake is real then the fraud can take place--whatever it is.

同类推荐
  • 英语PARTY——唐诗双声道

    英语PARTY——唐诗双声道

    本套书籍带你领略英语世界风景,感悟英语学习氛围,有助于英语学习。
  • 1984(英文原版)

    1984(英文原版)

    本书是英国左翼作家乔治·奥威尔于1949年出版的政治小说。小说刻画了一个令人感到窒息和恐怖的、以追逐力为很终目标的假想极主义社会。这部小说与英国作家赫胥黎著作的《美丽新世界》,以及俄国作家扎米亚京著作的《我们》并称反乌托邦的三部代表作。小说至今已被翻译成62种语言,优选销量超过3000万册,是20世纪影响力优选的英语小说之一。
  • 用英语介绍中国.这里是广州

    用英语介绍中国.这里是广州

    外国人面前,你能否用一口流利的英文介绍自己所在的城市呢?走出国门,你是否能够让更多的外国人了解广州灿烂悠久的文化?本书为读者奉上原汁原味的人文阅读精华,详细介绍了人们最感兴趣的广州历史文化、城市风景、广州生活、名人逸事等,带您全方位地了解广州。读者在学习英语的同时,又能品味这座南方文化名城的独特魅力。
  • 日常生活英语900句“袋”着走

    日常生活英语900句“袋”着走

    全书分4大类:生活、旅游、交际等,共涵盖90个话题。其中包括生活口语30个情景话题;旅游口语16个情景话题;休闲口语24个情景话题;交际口语20个情景话题;以大量实用的例句与场景会话让你将英语理解得更为透彻,从而掌握地道的表达方法。小开本的设计,方便读者携带,装到口袋里随时随地学英语。
  • ChinesePaintings

    ChinesePaintings

    本书以英文版的形式,介绍了《中国绘画珍藏》作品集。Chinesepaintinghasalonghistory.Forthousandsofyears,itundergoescontinuousenrichment,innovationanddevelopment.Artists,mainlyHanpeoplebutalsoincludingsomeminorities,createdistinctivepaintingstylesandavarietyoftechniques.
热门推荐
  • 神祇学院

    神祇学院

    未来架空玄幻。大女主。可能爱情比较少,也可能剧情比较少。
  • 旋风少女百草的真命天子

    旋风少女百草的真命天子

    百草诺白因小三分离,百草去韩国,爱上了少年宗师,两人经过众多磨难总在一起。
  • 奇葩大邪神

    奇葩大邪神

    “邪恶”校草重生缥缈幻境,怀着一颗耍流氓的赤心,修仙笑须弥,问道逗玄天。遥想帝王宫,三千佳人雨露不均沾,那就我来安慰你们寂寞的心灵!庙堂修真官,欺善逞威欲霸十重天,不行!天命邪神在此,尔等都靠边站!你日天不服?打到你服!良辰是谁?据说你有一百种功法让我混不下去?那我就有一百种打法让你找不到北!保证不带重样的!一代缥缈邪神,偶遇各路奇葩,辗压诸天神魔,且看他如何创造一个欢乐的须弥世界。邪神的口号就是:“世界那么大,让它充满快乐吧!”
  • 简·爱

    简·爱

    《简·爱》是一部带有自传色彩的长篇小说,主题是通过对孤女坎坷不平的人生经历,成功地塑造了一个不安于现状、不甘受辱、敢于抗争的女性形象,反映一个平凡心灵的坦诚倾诉的呼号和责难,一个小写的人成为一个大写的人的渴望。
  • 开局一张圣人体验卡

    开局一张圣人体验卡

    开局获得一张圣人体验卡,外加功德系统里的无数灵宝,各种强悍属性,杀敌效果棒棒哒。【真龙之血】=【连击】+【暴击】+【龙血】,属性:【破浪】+【龙吟】【真凤之炽】=【引燃】+【疾跑】+【凤髓】,属性:【炎爆】+【凤舞】【孟极离魂】=【潜匿】+【闪烁】+【孟极之魂】,属性:【蜃影】+【幽游】【穷奇之噬】=【暴食】+【巨力】+【穷奇骸骨】,属性:【吞噬】+【霸体】什么?你不愿意交出你的【龙血】、【凤髓】、【孟极魂】和【穷奇骨】?我这里还有【必杀一击】卷轴,【仙人一指】卷轴了解一下。还是不满意?好吧,让我开启‘圣人体验卡’跟你谈谈人生。
  • 网游寻仙

    网游寻仙

    天道崩坏,寻仙杀之。这不是一个和NPC做朋友的世界,我们是天魔,入侵整个神州。藏经楼收录道经法典,宗师殿降服神明仙王,法篆局衍生灵诀法咒,道兵池训练神将天兵,灵兽谷豢养凶兽灵禽,铸剑炉锻造神兵飞剑……我有洞天,不求神魔。灭仙宗,毁道庭,我是主宰!落魄的论坛快报记者重生而来,掀起波澜。
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 从天而降:少爷别太狂

    从天而降:少爷别太狂

    故事发生在妖精王国。一个银发女孩从天而降,落在了克列洛夫家的花园里。恰巧的摔在克列洛夫家的少爷齐格飞身上……传闻,那家的少爷脾气暴躁,如狼如虎。可为什么唯独对她放低身段,一宠成瘾?[]这个银发女孩究竟是何人?她的降临,将带给妖界什么样的浩劫?【男女主身心干净,放心入坑。】
  • 掩饰的高中生活

    掩饰的高中生活

    她是一个奇特的高中生,人人都觉得她非常的奇特。在高中,她是如何战胜自己,挑战生活的。
  • 绝世神医—妖孽腹黑七小姐

    绝世神医—妖孽腹黑七小姐

    黑道老大穿越。醒来天下无敌,绝美一世。打下一方地土,成为领主,不服,来找麻烦?小爷她打到你们国,灭城!白痴,废柴?怎么能,看她修炼到神级别。双修呦!白虎,神兽?先让她契约一两只再说。家族内斗,管你是谁,灭了再说。敢伤她的人,就要做好必死的觉悟!