登陆注册
23770800000080

第80章 Computer Security(10)

One of the most important international developments for defining security behavior has been the adoption of the international standard ISO 17799 Code of Practice for Information Security Management. It is a comprehensive management standard for addressing the full range of issues for protecting information. Sensible adoption and application of the standard could provide significant benefits both to business and consumers. Self regulation schemes would do well to consider adopting it as a means of providing a common frame of reference for security and privacy claims.

【New Words】

fraud

欺骗,欺诈行为,诡计

liability

责任,义务,倾向

sophisticated

诡变的,久经世故的

cryptography

密码使用法

alternative

选择性的

algorithm

运算法则

Exercise

1. Multiple Choices

(1)Most viruses are ______.

A. worms

B. files infectors

C. time bombs

D. boot sector viruses

(2)The most secure authentication approach is ______.

A. firewalls

B. encryption

C. biometric

D. digital certification

(3)Computer hobbyists who enjoy pushing computer systems to their limits are known as ______.

A. Trojan horses

B. crackers

C. hackers

D. cyber gang members

(4)To protect against data loss caused by power surges and outages, some application programs offer what feature?

A. auto save

B. uninterruptible power supply

C. denial of service

D. surge protection

(5)A sophisticated perimeter physical security system ______.

A. can not compensate for unguarded access by telephone line

B. can compensate for unguarded access by telephone line

C. can not compensate for unguarded access by modem

D. can compensate for unguarded access by a modem

(6)Interruption can cause asset of system ______.

A. unavailable

B. lost

C. useful

D. unusable

(7)The harmful actions performed by virus include______.

A. data theft

B. practical joke

C. file corruption

D. file deletion

(8)Fabrication intrusion includes ______.

A. to add records

B. to add spurious transaction

C. to interrupt a system

D. to fabricate objects

(9)Example of modification includes ______.

A. altering a program

B. modification of the values in a data base

C. ****** the operating system unavailable

D. modifying data being transmitted

(10)The virus is activated when ______.

A. an infected program is executed

B. a computer is accessing a mailbox through the Internet

C. a computer is in shutdown status

D. an infected operating system performs a task

(11)If a virus does not begin its activity, it ______.

A. stops its activity

B. performs its activity

C. updates its execution condition

D. finds the infect programs after updating its execution condition

2. Translate the following phrase into Chinese

(1)infection mechanism

(2)the interrupt descriptor table

(3)object tables

(4)trigger date

(5)executable code

(6)slack space

(7)the hooked interrupt

(8)Flash ROM technology

3. Fill in each blank with a suitable term according to its official definition.

(1)______, an information processor which performs the instruction processing work of the enterprise.

(2)______, a program designed to replicate and spread on its own.

(3)______, on disk or diskette storage, an addressable subdivision of a track used to record one block of a program or data.

(4)______, a suspension of a process, such as the execution of a computer program, caused by an event external to that process, and performed in such a way that the process can be resumed.

(5)______, a collection of data referred to by a single name.

(6)______, one part of a document, a program, or a routine.

4 Translate the following sentence into Chinese

(1)Various machine parts can be washed very clean and will be clean as new ones when they are treated by ultrasonic, no matter how dirty and irregularly shaped they may be.

(2)While the customer waits, the system checks the credit card to be sure that it is has not been reported stolen, has not expired, and is listed to the same address that the customer has given.

(3)When a chargeback occurs, merchant will end up paying the charge to the issuing bank, in addition to a chargeback fee that can be as high as $30 or more.

(4)The Office.net introduces lots of new features including collaboration features, speech recognition features, smart tagging and native XML support, close integration with Hotmail and MSN, tools for creating and working with Web components, and more.

同类推荐
  • 我的世界很小,但是刚刚好

    我的世界很小,但是刚刚好

    爱情是最美好的情感,爱情里的故事万万千。执子之手,与子偕老是千古流传的佳句,也是世人追求的最平凡而又最浪漫的最终归宿,我们的很小,我们的世界很小,但是真的刚刚好。
  • 第一哲学沉思录

    第一哲学沉思录

    “我思,故我在。”西方近代哲学之父笛卡尔以这一经典命题表明了与前此的传统哲学决裂,阐扬天赋观念论和理性至上论。笛卡尔的“我思”具有鲜明的怀疑、否定、判断的内容,尤其强调以怀疑、否定的精神将“历来信以为真的一切见解统统清除出去,再从根本上重新开始”。这就撼动了自中世纪以来经院哲学神圣不可侵犯的地位,从而在欧陆引发一场理性主义思潮,宣告了启蒙时代的到来。
  • 时光走了,你还在

    时光走了,你还在

    当我的天空灰暗时,你把快乐带来,你是我的阳光,我唯一的阳光。假如我的世界你不曾来过,我的心将如一池静水,波澜不惊;没有春的温馨,夏的热烈,秋的落寞,更不会满世界打听幸福的下落。
  • 玩转幽默英语

    玩转幽默英语

    搜集西方流传的九类笑话:女人与男人、童真童趣、雇主与雇员、律师与警察等,结合实用情景,逐一指点,保证读者活学活用,幽默中玩转英语。
  • 从Hello到玩转英语

    从Hello到玩转英语

    本书从生活中最常用的英语短句到模拟场景会话,循序渐进。本书亮点在于常用短句大全,重点则在场景会话部分。场景会话部分包含135个模拟情景,每个情景后都附有欧美文化介绍。语言与文化同步学习,掌握最地道英语。
热门推荐
  • 波娜

    波娜

    一个来自宇宙中的能量奇石,投胎到地球的四维空间里成为一个天族女孩,因为翅膀不能伸缩来到三维世界的天灵山修行院进行修行治病,由于与生俱来的能量,加上天医法师的特殊指导,她能否成为天族、灵族、人族中最为神奇的金刚法师么?她的感情最后能花落谁家呢?魔龙少年是魔还是真龙呢?敬请关注!
  • 推仙道纪

    推仙道纪

    极空有神仙,神仙靠人推,人推推仙票。海市蜃楼起仙风,神树境上求推仙、东南尖,五片城,欲望沙海难欲望、西雅图,七心池,清新雪原无清心、天榜轮回动天地,通宇连宙化凡尘。
  • 灿烂之约

    灿烂之约

    她,不算美丽,不算聪明,但她依旧像她的名字般灿烂。她倍受欺负,却很坚强。然而不幸的命运偏偏在她身上扎根……无意之中却发现她得到了她不可能会有的力量!,万幸的是她遇上他,似乎一切都变得那么真实……从此灿烂的约定就此而生!上天注定她的命运,注定她不会平凡!她岂能服输?……
  • 红二十四军始末

    红二十四军始末

    本书主要讲述了中国北方第一支工农武装——红二十四军的筹建、发展以及在险恶环境下最终失败的辉煌历程。它存在时间虽短,但意义重大。
  • 小小剑仙

    小小剑仙

    “为何要成仙?”“我想让这个世界记住我!”“这个世界一定会记住你的。”
  • 修士无双:冰山小姐太嚣张

    修士无双:冰山小姐太嚣张

    天才的舞者叶清洛,出身高贵娇生惯养,一朝背叛,穿越至男尊女卑的玄幻世界。女子修炼大逆不道?我偏偏要修炼给你看女子天生不宜习武?老娘上辈子被叫了十八年的天才,从十二岁开始也比你们这些土著强!庶姐姨娘?那只是无聊时消遣的玩物;父辈亲族?再强大也别想把我当成傀儡。惹天,犹可恕;惹我,不可活!——女子生来就是男人的附庸,相夫教子才是正途?习剑修炼收异兽,男人能干的我样样都能,男人不能生孩子,我也能!叶清洛咬牙切齿的看着那个男人:“你……”顾梓年邪邪一笑,眼神里却尽是温柔:‘愿赌服输以身相许,这可是你说的……“
  • 苍穹仙域

    苍穹仙域

    长生,多么诱惑。自古以来,多少人杰探寻长生,多少天才埋骨他乡,却无人可见。仙境漫漫无尽头,天骄黯然白发人。一个少年从大荒中走出,征战天地。东方的最古老家族,西方诸神云集之地,还有星空对岸的万载大陆。天骄林立,群星闪耀,问世间谁主浮沉,唯我问鼎仙域!
  • 星辰战世纪

    星辰战世纪

    不知道公告应该发在哪,写在简介上,本书已经推倒重写了,存稿神马的已经完全删除了,已经上传的挨个重写!
  • 瓷公主的爱

    瓷公主的爱

    最后的告别,引来了一段凄美的爱情故事,这段爱情能否有一个好的结果呢?馨儿,不管你如何对我,我都不介意——上官辰馨儿,原谅我,不择手段的得到你,可是,我是真的爱你!!!——秦雨然辰,我配不上你了,我也不该爱上你——林馨因为爱你,所以伤你伤的更痛!!!
  • 复制初恋

    复制初恋

    韩秀在臭轰轰的垃圾堆里发现了一个浑身是血的裸男,竟然是她青梅竹马应该在大洋彼岸叫做美国的地方的前任花心贱男友唐泽齐。经向朋友了解后,唐泽齐突然回国的原因不明,十分古怪。看在唐泽齐母亲杜老师的份上,韩秀勉强让唐泽齐住下。多日相处下来,韩秀发现唐泽齐的头脑很不好使,类似精神患者,问他记不记得自己的名字,他竟然告诉她他不叫唐泽齐,他的名字叫“074”或者小七。小七犹如火星人一般的思想与常识,韩秀初步判定为失忆。借机,她将对这个世界一无所知的他拉入清洁工一行,轮为赚钱工具,坚决执行不能白吃白喝白住白穿原则。随着时间的推移,韩秀发现他与以前是盼若两人,虽然整天冷冰冰从未展露过正常人该有的笑脸,但对她的细心总是体现在生活的细节中。虽然是同样的脸,不同样的性格,她恐慌地发现,夜店里那个男人才是曾经的青梅竹马,货真价实的唐泽齐。她深爱的男人究竟是谁?究竟去了哪里?他究竟背负了怎样的秘密?尊敬的书友,本书选载最精华部分供您阅读。留足悬念,同样精彩!