欢迎来到天天文库
浏览记录
ID:50347941
大小:203.50 KB
页数:29页
时间:2020-03-08
《计算机英语教程 教学课件 作者 吕云翔 杨雪 林珣_ Unit 10.ppt》由会员上传分享,免费在线阅读,更多相关内容在应用文档-天天文库。
1、Unit10ComputerSecurity计算机英语教程教学课件ContentsPart1ReadingandTranslatingSectionA:ComputerSecuritySectionB:ComputerVirusSectionC:FirewallPart2SimulatedWriting:BusinessLetterPart3ListeningandSpeakingDialogue:UsingAnti-virusSoftwareListeningComprehension:HackerandCrackerDictation:F
2、atheroftheMouse—DougEngelbart1.1ComputerSecurityIntroductionSecurityArchitectureHardwareMechanismsthatProtectComputersandDataSecureOperatingSystemsSecureCodingApplications1.1ComputerSecurityComplexSentencesOriginal:Iftheoperatingenvironmentisnotbasedoinasecureoperatingsyste
3、mcapableofmaintainingadomainforitsownexecution,andcapableofprotectingapplicationcodefrommalicioussubversion,andcapableofprotectingthesystemfromsubvertedcode,thenhighdegreesofsecurityareunderstandablynotpossible.Translation:如果操作环境不是基于一个安全的操作系统——能够维持自己的执行域,并能保护应用程序代码免受恶意破坏,以及
4、保护系统免受破坏代码损害,那么高安全程度是显然不可能的。1.1ComputerSecurityExercisesI.Readthefollowingstatementscarefully,anddecidewhethertheyaretrue(T)orfalse(F)accordingtothetext.___1.Computersecurityisabranchoftechnologyarrangedunderinformationsecuritycategory.___2.Physicallylimitingaccesstocompute
5、rsisapproximatelyoneofthestrongestapproachestoimprovecomputersecurity.___3.Computerprogrammingstrategiesareoftenconsideredasthemostdependentapproachforcomputersecurityamongothers.___4.Inaviation,transmittingunauthorizedcommunicationsoverspecificradiofrequenciesmayspoofairtr
6、afficcontrollersorsimplydisruptcommunicationsaltogether.___5.Theissuesofcomputersecurityareanindispensablepartofmaintaininganoperationalindustry.1.1ComputerSecurityII.Choosethebestanswertoeachofthefollowingquestions.1.Whatistheprimarydifferenceofcomputersecurityfromsomeothe
7、rcomputersciencefields?A.ItsvariedobjectivesB.ItspositiveenforceablerulesC.ItsnegativerequirementsD.ItsimpracticalformostcomputerprogramsC1.1ComputerSecurityII.Choosethebestanswertoeachofthefollowingquestions.2.Whichofthefollowingstrategiesisdemonstratedviatheexampleof“theB
8、ell-LaPadulamodel”belongs?A.SecureArchitectureB.SecureOperatingSystemsC.SecureCodi
此文档下载收益归作者所有