首页 > 大学本科
题目内容 (请给出正确答案)
[主观题]

Computer Security 计算机安全 The techniques developed to protect single computers and network-link

Computer Security

计算机安全

The techniques developed to protect single computers and network-linked computer systems from accidental or intentional harm are called computer security. Such harm includes destruction of computer hardware and software, physical loss of data, and the deliberate invasion of databases by unauthorized individuals.

Data may be protected by such basic methods as locking up terminals and replicating data in other storage facilities. More sophisticated methods include limiting data access by requiring the user to have an encoded card or to supply an identification number or passworD. Such procedures can apply to the computer data system as a whole or may be pinpointed for particular information banks or programs. Data are frequently ranked in computer files according to degree of confidentiality.

Operating systems and programs may also incorporate built in safeguards, and data may be encoded in various ways to prevent unauthorized persons from interpreting or even copying the material. The encoding system most widely used in the United States is the Data Encryption Standard (DES), designed by IBM and approved for use by the National Institute of Standards and Technology in 1976. DES involves a number of basic encrypting procedures that are then repeated several times. Very large scale computer systems, for example, the U. S. military Advanced Research Project Agency Network (ARPANET), may be broken up into smaller subsystems for security purposes, but smaller systems in government and industry are more prone to system-wide invasions. At the level of personal computers, security possibilities are fairly minimal.

Most invasions of computer systems are for international or corporate spying or sabotage, but computer hackers[1]may take the penetration of protected databanks as a challenge, often with no object in mind other than accomplishing a technological feat. Of growing concern is the deliberate implantation in computer programs of worms or viruses[2]that, if undetected, may progressively destroy databases and other software. Such infected programs have appeared in the electronic bulletin boards available to computer users. Other viruses have been incorporated into computer software sold commercially. No real protection is available against such bugs except the vigilance of manufacturer and user.

Anti-Virus Programs to the Rescue

There is a wide range of virus protection products available to combat the 11,000 known viruses that currently plague personal computers. These products range in technology from virus scanners to terminate and stay resident monitors, to integrity checkers to a combination of the three. Each of these techniques has its associated strengths and weaknesses.[3]

The most fundamental question that must be asked when considering and evaluating automated anti-virus tools is "how well does the product protect against the growing virus threat?" When developing a security program, companies must think long term. Not only must you choose a form of protection that can detect and safely eliminate today's varieties, but you must consider tomorrow's gully wash as well.[4]The real challenge lies in securing against the 38,000 new species that are expected to appear within the next two years. The 11,000 known viruses that have been documented to date represent what is only the tip of the iceberg in terms of what tomorrow will bring.

Virus Protection Methods

Today there exists three broad based categories of anti-virus techniques: scanners, memory resident monitors (TSRs), and integrity checkers.

Virus Scanners

Virus scanners are programs designed to examine a computer's boot block, system memory, partition table, and executable files,[5]looking for specific code patterns that are typical to known virus strains. Generally, a virus scanner is able to identify a virus by name and indicate where on the hard drive or floppy drive the infection has occurreD. Virus scanners are also able to detect a known virus before it is executeD. Virus scanners do a good job of detecting known viruses. They are generally able to find a virus signature if it is present and will identify the infected file and the virus. Some are faster than others, which is an advantage when checking a hard disk with thousands of files. But virus scanners have several major weaknesses.

First and foremost, scanners are completely ineffective against any virus whose code pattern is not recognizeD. In other words, scanners cannot identify a virus if they don't have a signature for it. Also, many of today's viruses are designed specifically to thwart scanners. These so-called stealth viruses know the correct file size and date for a program (i. e. , what they were before the virus infected them). They will intercept operations that ask for that information and return the pre-infection values, not the actual ones during a disk reaD. Some viruses can mutate slightly so that the original signature will be rendered ineffective against the new strain and can even result in file damage if recovery is based off virus signature assumptions. A new wave in virus authorship is the creation of self mutating viruses. These viruses infect a file in a different way each time, so it cannot be identified by a simple pattern search, rendering virus scanners ineffective.

Secondly, virus scanners are quickly rendered obsolete and require frequent, costly and time-consuming updates—which may be available only after serious damage has been done. The burden of constantly updating virus scanners, even if provided free of charge, can be a huge burden. In a corporate environment, where thousands of personal computers must be protected, simply distributing scanner updates in a timely and efficient manner and making sure they are installed is an enormous task.

I ntegrity Checkers

This is a relatively new approach, compared to scanners and monitors. Integrity checkers incorporate the principle modification detection. This technique safeguards against both known and unknown viruses by making use of complex file signatures and the known state of the computer environment rather than looking for specific virus signatures.

Each file has a unique signature (which is like a fingerprint-a unique identifier for that particular file) in the form of a CRC or a checksum. Changes in any character within the file will probably change the file's checksum. For a virus to spread, it must get into system memory and change some file or executable code.

An integrity checker will fingerprint and register all program files and various system parameters, such as the boot block, partition table, and system memory, storing this information in an on-line database. By recalculating the files checksum and comparing it to the original, integrity checkers can detect file changes that are indicative of a virus infection.

Industry experts agree that integrity checking is currently the only way to contend with tomorrow's growing virus threat. Since this methodology is non-reliant on virus signatures, it offers protection against all potential viruses, today's and tomorrow's.

Additionally, stealth viruses have historically been able to bypass integrity checkers. The only way users can be certain that their computer is 100 percent clean is to boot the system from a clean, DOS based disk and check the integrity of the information stored on this disk with the current state of the hard drive. Called the "Golden Rule" in virus protection, most integrity checkers fail to follow this security principle.

System Administrator

System Administrator, in computer science, is the person responsible for administering Use of a multiuser computer system, communications system, or both. A system administrator performs such duties as assigning user accounts and passwords, establishing security access levels, and allocating storage space, as well as being responsible for other tasks such as watching for unauthorized access and preventing virus or Trojan Horse[6]programs from entering the system. A related term, sysop (system operator), generally applies to a person in charge of a bulletin board system, although the distinction is only that a system administrator is associated with large systems owned by businesses and corporations, whereas a sysop usually administers a smaller, often home- based, system.

Hacker

Hacker, in computer science, originally, is a computerphile, a person totally engrossed in computer programming and computer technology. In the 1980s, with the advent of personal computers and dial up[7]computer networks, hackers acquired a pejorative connotation, often referring to someone who secretively invades others computers, inspecting or tampering with the programs or data stored on them. (More accurately, though, such a person would be called a cracker.) Hacker also means someone who, beyond mere programming, likes to take apart operating systems and programs to see what makes them tick.

Notes

[1]computer hackers:电脑黑客,指非法侵入他人计算机进行浏览或篡改程序或计算机上所存数据的人。

[2]Of growing concern is the deliberate implantation in computer programs of worms or viruses.越来越令人担心的是蓄意地把蠕虫程序或病毒植入计算机程序。

[3]These products range in technology from virus scanners to terminate and stay resident monitors,to integrity checkers to a combination of the three.Each of these techniques has its associated strengths and weaknesses.这些防病毒的产品从技术上有病毒扫描到内存驻留监督程序,从完整性检查到三者的结合程序,每一种有其相关的优点和缺点。

[4]gully wash:gully冲沟,檐槽。此处字面意义是“冲水槽”,可翻译成“但必须从长计议”或“考虑到未来的问题”。

[5]to examine a computer's boot block,system memory,partition table,and executable files:检查计算机的引导块、系统内存、分区表和可执行文件。

[6]Trojan Horse:特洛伊木马,一种欺骗程序。在计算机安全学中,一种计算机程序,表面上或实际上有某种有用功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。

[7]dial up:拨号呼叫,访问计算机的一种方法。计算机通过调制解调器连接到电话线路上,拨号上网。

Choose the best answer for each of the following:

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“Computer Security 计算机安全 The te…”相关的问题
第1题
The Trusted Computer Security Evaluation Criteria (TBSEC) provides ()

A.a basis for assessing the effectiveness of security controls built into automatic data-processing system products

B.a system analysis and penetration technique where specifications and document for the system are analyzed

C.a formal static transition model of computer security policy that describes a set of access control rules

D.a means of restricting access to objects based on the identity of subjects and groups to which they belong

点击查看答案
第2题
Coding in computer security makes data be unintelligible to the outside observer.()
点击查看答案
第3题
Which of the following is NOT true of security attacks? [A] Employees will keep up

Which of the following is NOT true of security attacks?

[A] Employees will keep up with security polices and awareness if they are highly-trained.

[B] The rate of security attacks appears faster than the growth of the Internet.

[C] One's computer system will never be secure.

[D] Vulnerabilities can go through phones, wireless devices, and network appliances

点击查看答案
第4题
Which of the following is NOT true of security attacks?A.Employees will keep up with secur

Which of the following is NOT true of security attacks?

A.Employees will keep up with security polices and awareness if they are highly-trained.

B.The rate of security attacks appears faster than the growth of the Internet.

C.One's computer system will never be fully secure.

D.Vulnerabilities can go through phones, wireless devices, and network appliances.

点击查看答案
第5题
Which is included in the formula that Windows NT/2000 uses to create the Security Iden

A.A semi-random number generated by the CPU based on the number of processes in the queue

B.A set of numbers based on the serial number of the computer CPU and the serial number of Windows NT

C.The computer name and the current amount of CPU time used by the user mode

D.The octal encryption of the user name and the password

点击查看答案
第6题
Recently, several thousand computers in the United States were attacked by a virus. The co
mputers were slowed or shut down. But no information was lost. A computer virus is similar to a biological virus--an organism (生物体) that can harm the human body. A computer virus is a series of electronic commands that can harm a computer or the information in the computer. It infects the device (设备) secretly. It tells the computer to do something the computer's owner does not want it to do. For example, a virus could enter a bank's computer system. It might tell the system to destroy all information about money belonging to everyone with the first name United States several months ago. The virus was created by a university student studying computer science. The computers affected by the virus were in major universities, government agencies (政府机关) and private (私人) companies. They were part of a United commands in a computer at his school. The computer sent the commands to other computers through the linked telephone lines.

The virus told each computer to make many copies of itself. Within a few minutes, all the computers' power was being used to make copies of the virus. The computer could do no other work. It finally slowed down greatly, or simply stopped working. Computer experts spent many days trying to destroy the virus in the computer system.

The experts agree the virus could have been much worse. They say it could have sent orders to destroy huge amounts of electronic information.

Many experts believe, the recent computer virus showed the need for better computer security (安全). But that is a problem. The affected system provides a free exchange (交换) of ideas and information among universities, private companies and government offices. Increasing security too much would destroy this exchange. It would slow progress on many important research projects.

Which of the following statements is true?

A.Many computers were attacked by a virus in the U. S.

B.Many computers attacked by a virus in the U.S. lost their information.

C.A computer virus can harm human body.

D.A computer virus can help the computer owner do many things.

点击查看答案
第7题
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now h
ighly recognisable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original backer ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.

The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.

The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will-be introduced into your environment every day. Even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access. There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan your network for common backdoor services, and use intrusion detection systems, vulnerability scans, and anti-virus protection.

Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?

A.They were all good examples of today's computer users.

B.They were driven by greed, power, revenge, or some other malicious intent.

C.Their goal was to push programs beyond what they are designed to do.

D.They are all dead.

点击查看答案
第8题
Text 3 The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, al
l now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.

The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.

The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.

There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.

第31题:Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?

[A] They are all good examples of today's computer users.

[B] They are driven by greed, power, revenge, or some other malicious intent.

[C] Their goal is to push programs beyond what they are designed to do.

[D] They are all dead.

点击查看答案
第9题
The "MyDoom" virus could presage a generation of computer attacks by organised gangs aimin
g to extract ransoms from online businesses, experts said yesterday.

The warning came as the website run by SCO, a company that sells Unix computer software, in effect disappeared from the web under a blizzard of automated attacks from PCs infected by the virus, which first appeared a week ago.

The "myDoom-A" version of the virus is reckoned to be the worst to have hit the internet, in terms of the speed of its spread, with millions of PCs worldwide believed to be infected. Such "zombie" machines begin to send out hundreds of copies of the virus every hour to almost any e-mail address in their files.

On Sunday they began sending automated queries to SCO's website, an attack that will continue until 12 February. The attack is the web equivalent of ringing the company's doorbell and running away a million times a second, leaving its computers unable to deal with standard requests to view its pages.

"You have to wonder about the time limit," said Graham Cluley, senior technology consultant at the antivirus company Sophos. "Someone could go to SCO after the 12th and say, 'If you don't want this to happen again, here are our demands'." Raimund Genes, European president of the security software firm Trend Micro, said: "Such a programme could take out any major website on the internet. It's not terrorism, but it is somebody who is obviously upset with SCO."

SCO has earned the enmity of computer users through a lawsuit it has filed against IBM. SCO claims ownership of computer code it says IBM put into the free operating system Linux, and is demanding licence fees and damages of $1bn.

Mr. Cluley said: "It might be that whoever is behind this will say to SCO, 'if you don't want the next one to target you, drop the lawsuit'." SCO has offered $250,000(£140,000) for information leading to the arrest of the person or people who wrote and distributed MyDoom.

Nell Barrett, of the security company Information Risk Management, said, "I would give a lot of credence to the idea of gangs using viruses to extort money. It's hard for law enforcement to track them down, because they're using machines owned by innocent people."

A second variant of MyDoom will start attacking part of Microsoft's website later today. The antivirus company MessageLabs said it had blocked more than 16 million copies of the virus in transit over the net so far. But millions more will have reached their targets.

The onset of a new generation of computer attacks was marked by ______.

A.an organization of gangs

B.the infection of PCs

C.the sale of a software

D.a website's vanishing

点击查看答案
第10题
The Internet affords anonymity to its users, a blessing to privacy and freedom of speech.
But that very anonymity is also behind the explosion of cyber-crime that has 1 across the Web.

Can privacy be preserved 2 bringing safety and security to a world that seems increasingly 3 ?

Last month, Howard Schmidt, the nation's cyber-czar, offered the federal government a 4 to make the Web a safer place—a "voluntary trusted identity" system that would be the high-tech 5 of a physical key, a fingerprint and a photo ID card, all rolled 6 one. The system might use a smart identity card, or a digital credential 7 to a specific computer, and would authenticate users at a range of online services.

The idea is to 8 a federation of private online identity systems. User could 9 which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver's license 10 by the government.

Google and Microsoft are among companies that already have these " single sign-on" systems that make it possible for users to 11 just once but use many different services.

12 , the approach would create a " walled garden" in cyberspace, with safe " neighborhoods" and bright "streetlights" to establish a sense of a 13 community.

Mr. Schmidt described it as a "voluntary ecosystem" in which "individuals and organizations can complete online transactions with 14 , trusting the identities of each other and the identities of the infrastructure 15 which the transaction runs. " Still, the administration's plan has 16 privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would 17 be a compulsory Internet "drive's license" mentality.

The plan has also been greeted with 18 by some computer security experts, who worry that the "voluntary ecosystem" envisioned by Mr. Schmidt would still leave much of the Internet 19 . They argue that all Internet users should be 20 to register and identify themselves, in the same way that drivers must be licensed to drive on public roads.

【B1】

A.swept

B.skipped

C.walked

D.ridden

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改