2009-7-27 P,1
Unit 18
Measures For Computer Security
Chapter Four
&Part4 Extensive Reading@ Part 1 Notes to Text
@Part5 Notes to Passage& Part 2 Word Study
@Part3 Practice on Text @Part6 Practice on Passage
2009-7-27 P,2
@ Part 1 Notes to Text
1) Most large organizations have a disaster recovery plan
describing ways to continue operating until normal
computer operations can be restored,大多数大机构都有灾难恢复计划,用以阐述可以持续到计算机恢复正常运行为止的操作方式。
注释,现在分词短语 describing ways to … 做定语,修饰宾语 a
disaster recovery plan,相当于 which describes ways to…,
不定式 to continue operating是定语,修饰 ways。
2) Hardware can be kept behind locked doors,but often
employees find this restriction a hindrance,so security is
lax,可以将硬件锁在安全门之后,但雇员常常觉得这种约束很麻烦,因此安全措施也就松弛了注释,动词短语 find this restriction a hindrance 中的名词 a
hindrance是宾语补足语。常见类似,find+宾语 +宾补”的动词有,believe,consider,declare,imagine,know,prove,
suppose,feel,think,understand等。而充当宾补的词类有许多,
如不定式、分词、形容词、名词等。
Measures For Computer Security
2009-7-27 P,3
3) Many companies therefore will form a cooperative
arrangement to share equipment with other companies in the
event of catastrophe,因此,许多公司会与其它公司达成合作协议,
在出现灾难的情况下共享设备。
注释,介词短语 in the event of catastrophe 是表时间的状语;不定式短语 to share equipment… 是定语,修饰 a cooperative
arrangement。但也可视之为 a cooperative arrangement同位语。
4) Most companies have ways of trying to keep software and
data from being tampered with in the first place,大多数公司首先就会采取一些方法,极力防止软件和数据被篡改。
注释,of后面的部分是对 ways进行说明,因此与 ways属于同位关系;
不定式 keep…from (防止 …… 的发生和出现)是动名词 trying的宾语。
2009-7-27 P,4 End
5) Some federal agencies have suggested that a standard
encryption procedure be used so that law enforcement
agencies can monitor suspected criminal communications,
一些联邦机构建议采用标准的加密程序,以便执法机构能够监控疑犯的通信。
注释,由于该句的谓语动词是 suggested,所以宾语从句中的谓语动词 be used采用了省去 should的虚拟语气形式。动词象
demand,propose,order,arrange,insist,command,require,
request,desire等后面的宾语从句都需要使用,(should)+动词原形”的虚拟形式。
2009-7-27 P,5 End
1,encryption n,加密 10,screen v,甄别,鉴别;选拔
2,anticipating disasters 预防灾难 11,applicant n,求职者
3,tamper v,篡改 12,audit v,审计
4,recovery n,恢复 13,enforcement n,执行,实施
5,restriction n,限制 14,wiretap v,搭线窃听,窃听或偷录
6,hindrance n,妨碍,障碍 15,suspected adj,可疑的
7,lax adj,松懈的 16,federal adj,联邦的
8,catastrophe n,灾难 17,the clipper chip 加密芯片
9,irreplaceable adj,无法替代的 18,the key escrow chip 密钥托管芯片
& Part 2 Word Study
2009-7-27 P,6
Task 1,Listening training
Dictation of some key words
Directions,You will hear some key words twice,most of which are taken from
the Word Study,Then finish the Crossword Puzzle,(See you book p,)
2,Dictation of some key expressions
Directions,You will hear some key expressions twice,most of which are
taken from this text,Then you are asked to complete the missing words.
@Part3 Practice on Text
1) making ______________copies
2) protecting__________________
3) ___________________systems
4) in the event of_______________
5) __________________locations
6) international__________________
backup
software and data
ceiling sprinkler
catastrophe
in remote
the key escrow chip
2009-7-27 P,7
Read and Reply
Directions:Students are required to read aloud the whole text after
the teacher,Then give short answers to the following questions:
Task 2,Read,Write and Translate
Security measures consist of encryption,restricting access,
anticipating disasters,and making backup copies.
Most large organizations have a disaster recovery plan
describing ways to continue operating until normal
computer operations can be restored.
Because businesses have been encrypting,or coding,
messages for years,They have become so good at it that some
law enforcement agencies are unable to,wiretap” messages
from suspected criminals.
c) Why do some federal agencies suggested that a standard
encryption procedure be used?
a) What does security measures consist of?
b) What plan do most large companies have to prepare for
disasters?
2009-7-27 P,8
( )1) A company’ s equipment and data can always be
replaced,
( )2) Companies (and even individuals) should always make
preparations for disasters,
( )3) Law enforcement agencies can,wiretap” messages
from any company if they want,
( )4) The safest way to protect a company’ s data is to make
frequent backups of data and to store them in remote
locations.
( )5) Special emergency facilities called cold sites may be
created if they are fully equipped computer centers.
Read and Judge
End
F
T
F
T
F
2009-7-27 P,9
Directions:Read the following short passage,Complete it by filling in the missing words.
A,actual B,actions C,concerned D,according to E,purpose
F,which G,traditional H,security I,seen J,systems
Computer 1)_____is an application of information security to both
theoretical and 2)_____computer systems,For the sake of simplicity,issues
regarding privacy should be handled under the subject of information
privacy rights,For the 3)_____of this article,Computer security is a branch
of computer science 4)_____with risk management trade-offs in the areas of
confidentiality,integrity and availability of electronic information that is
processed by or stored on computer5)______.
The 6)_____approach is to create computing platforms,languages,and
applications that enforce restrictions such that agents can only perform
7)____that have been allowed 8)_____some specified Computer security
policy,Computer security can also be 9)____as a subfield of security
engineering,10)_____looks at broader security issues in addition to
computer security.
Read and Complete
End
H
A
E
C
J
G
B D
I
F
2009-7-27 P,10
1)他与其说是助手,不如说是障碍。( hindrance)
2)有人乱动了这把锁。( tamper)
3)他看上去很穷,可是我怀疑他很有钱。 (suspect)
4)因为工资低,没有人申请这份工作。 (applicant)
5)他正从感冒中恢复过来。 (recover)
Read and Translate
Directions:Put the following sentences into English,using the words or phrases given.
End
He is more a hindrance than a helper.
Someone has been tampering with this lock,
He seems poor,but I suspect that he has quite a lot of money
As the wages were low,there were no applicants for this job.
He is recovering from influenza.
2009-7-27 P,11
Security In Computing
The major assets(资产 )of computing systems are hardware,software,
and data,There are four kinds of threats to the security of a
computing system,interruption(中断 ),interception(拦截 ; 侦听 ),
modification(伪造 ),and fabrication,The four threats all exploit
vulnerabilities(弱点 )of the assets in computing systems,These four
threats are shown as follows.
(1) In an interruption,an asset of the system becomes lost or
unavailable or unusable,An example is malicious(怀恶意的 )
destruction of a hardware device,erasure(擦除 )of a program or data
file,or failure of an operating system file manager so that it cannot
find a particular disk file.
(2) An interception means that some unauthorized(未被授权的 )party
has gained access to an asset,The outside party can be a person,
a program,or a computing system,Examples of this type of failure
are illicit(违法的 )copying of program or data files,or wiretapping(窃听 )to
obtain data in a network,While a loss may be discovered fairly
quickly,a silent interceptor(拦截机 )may leave no traces by which the
interception can be readily detected.
&Part4 Extensive Reading
2009-7-27 P,12
(3) If an unauthorized party not only accesses but tampers with an
asset,the failure becomes a modification,For example,someone
might modify the values in a data base,alter a program so that it
performs an additional computation,or modify data being
transmitted electronically,It is even possible for hardware to be
modified,Some cases of modification can be detected with simple
measures,while other more subtle changes may be almost
impossible to detect.
(4) Finally,an unauthorized party might fabricate(伪造 )counterfeit(赝品 )objects for a computing system,The intruder may wish to add
spurious(伪造的 )transactions to a network communication system,or
add records to an existing data base,Sometimes these additions
can be detected as forgeries,but if skillfully done,they are virtually
indistinguishable from the real thing.
These four classes of interference with computer activity --
interruption,interception,modification,and fabrication - can
describe the kinds of exposures possible.
2009-7-27 P,13
The goal of computer security is to institute(制定 )controls that
preserve secrecy,integrity,and availability.
Here we will survey the controls that attempt to prevent
exploitation of the vulnerabilities of computing systems.
(1) Host security means that the fault of a host,especially of a
server in a network can destroy or lose the data stored in the host,
The serious accident will cause the system to paralyse(使瘫痪 ),The
effective way to guarantee host security is to take the technologies
of fault-tolerance(容错 ).
(2) Identifying
Most simplest identification is the password which is very familiar
for almost computer users,Besides,digital signature,finger-print
scanning and voice-wave analysis can also be used to check the
user's ID.
(3) Access control is an ability control for users to access and
use the resources of computer system,A useful access control is
the user's rights or authorities to access the files and directories of
computer.
2009-7-27 P,14
(4) Encryption is the most powerful tool in providing computer security.
Essentially,encryption is a coding,By transforming data so that it is
unintelligible(难解的 )to the outside observer,the value of an interception
and the possibility of a modification or a fabrication are almost
nullified(无效 ).
Encryption provides secrecy for data,Additionally,encryption can be
used to achieve integrity,since data that cannot be read generally also
cannot be changed.
(5) Security audit(检查 )is a safety measure in which the audit program
tracks records,and processes the events happened in the computer
system,Audit software can be used for locating the intruders.
(6) Security management is a administrative(管理的,行政的 ) means for the
system security,which includes making rigorously enforce rules and
regulations,even policies and laws.
(7) Firewall is a mechanism used for protecting the users outside of
network from accessing some non-authorized computer resources.
End
2009-7-27 P,15
@Part5 Notes to Passage
An example is malicious destruction of a hardware device,
erasure of a program or data file,or failure of an operating
system file manager so that it cannot find a particular disk
file,例如,蓄意破坏硬件设备,删除程序或数据文件或造成操作系统的文件管理程序故障,导致无法找到某一磁盘文件。
注释,此句是复合结构。主句的谓语部分是系表结构,表语则由三个名词性短语构成,1,malicious destruction of a hardware
device; 2,erasure of a program or data file; 3,failure of
an operating system file manager;连词 so that 引导的是结果状语从句,其主语 it,指前文的 an operating system file
manager。
2) While a loss may be discovered fairly quickly,a silent
interceptor may leave no traces by which the interception
can be readily detected,尽管数据丢失可能会很快被发现,但悄然的截取者恐怕不会给侦听留下容易检测的痕迹。
注释,While引导让步状语从句;定语从句 by which the
interception can be readily detected修饰先行词 traces; by
which是该从句的方式状语。
2009-7-27 P,16
3) Sometimes these additions can be detected as forgeries,
but if skillfully done,they are virtually indistinguishable from
the real thing,有时,这些添加的内容可以作为伪造品检测出来,但如果做得很巧妙,就可以达到以假乱真,几乎难以辨识的地步。
注释,此句是并列复合句。 but 连接第二分句。其中 if skillfully
done是过去分词短语作状语,相当于 if these additions were
skillfully done。
4) By transforming data so that it is unintelligible to the
outside observer,the value of an interception and the
possibility of a modification or a fabrication are almost nullified,
通过对数据进行变换,使局外人看起来无法理解,这样,窃取的数据就无用,修改或伪造的可能性几乎为零。
注释,By transforming data so that it is unintelligible to the
outside observer是方式状语,里面的 it是指 data;注意该主句的主语有两个,the value和 the possibility;过去分词 nullified此处作表语,而非被动语态。
2009-7-27 P,17 End
5) Security audit is a safety measure in which the audit program
tracks records,and processes the events happened in the
computer system,安全审计是一种安全措施。采用这种方式,审计程序就可以跟踪记录,处理计算机系统中发生的事件。
注释,定语从句 in which,..修饰前面的表语 a safety measure;过去分词短语 happened in the computer system也是定语,其先行词则是 the events。
2009-7-27 P,18
1.Listening Challenge
Spot Dictation
Directions,The following passage will be heard 3 times,During the second time,you
are required to put the missing words or phrases in the numbered blanks according to
what you hear,The third time is for you to check your answers,Now the passage
begins.
The early Multics operating system was 1)_________ for its early
emphasis on computer 2)________ by design,and Multics was
possibly the very first 3)__________ system to be designed as a
secure 4)_______ from the ground up,In 5)______ of this,Multics'
security was broken,not once,but 6)___________,The strategy was
known as 'penetrate and test' and has become widely known as a
non-terminating 7)______________ that fails to produce computer
security,This led to 8)__________ work on computer security that
prefigured 9)_________ security engineering techniques producing
closed form processes that 10)______________.
@Part6 Practice on Passage
End
notable
security
operating
system spite
repeatedly
process
further
modern
terminate
2009-7-27 P,19
End of this Unit