计算机领域的问题,计算机领域中有安全问题吗

a9f53cb18900e0d009150c1f5970fa47.png

This book is about security for computing systems,not banks.Consider the security differences between computing systems and banks.

• Size and portability.The physical devices in computing are so small that a thousand dollars of computing gear will fit comfortably in a briefcase,and ten thousand dollars’ worth can be carried comfortably in two arms.

• Ability to avoid physical contact.Electronic funds transfers account for most transfers of money between banks.For example,private companies pay employees by direct computer transfer instead of check.Utilities,insurance companies,and mortgage companies automatically process deductions against their clients’bank accounts.Customers can even bank at home,moving funds between accounts and arranging withdrawals by touch-tone phone access to a computer.

• Value of assets.The value of the information stored in a computer is also high.Some computers contain confidential information about a person’s taxes,investments,medical history,or education.Other computers contain very sensitive information about new product lines,sales figures,marketing strategy,or military targets,troop movements,weapons capabilities and so forth.

In terms of security,computing is very close to the v,ild wept days.At some installations,computers and their data have been recognized as a valuable and vulnerable resource,and appropriate protection has been applied.Other installations are dangerously deficient in their security measures.But,unlike the“wild west”bankers,some computing professionals and managers do not even recognize the value of the resources they use or control.

Worse yet,in the even of a crime,some companies will not investigate or prosecute,for fear that it will damage their public image.For example,would you feel safe depositing your money in a bank that had just suffered a five million dollar loss through computer embezzlement?[1]

Criminal investigation and prosecution are hindered by statutes that do not recognize electromagnetic signals as property.The new、media have recently pictured computer intrusion by teenagers as pranks no more serious than tipping over an outhouse.

Obviously,security in computing is a very important issue.It is an area that deserves study by computer professionals,managers,and even many computer users.

NOTES

[1]这是一个疑问句,that引出的定语从句修饰bank。

KEYWORDS

security 安全(性)

alarm system 报警系统

portability 可携带性,可移植性

intrusion 入侵

EXERCISES

Fill in the blanks with appropriate words or phrases.

(1)Electronic funds transfers are able to avoid___with money.

(2)Private companies pay employees by___.

(3)At some installations,___have been recognized as a valuable and vulnerable resource.

(4)Because electromagnetic signals are not recognized as properly,___are hindered.

(5)___is an area that deserves study by computer professionals,managers,and even many computer users.

(6)Size of notebook computer is very___.

(7)The value of the information stored in a computer is___.

a.security in computing

b.direct computer transfer

c.criminal investigation and prosecution

d.small

e.physical contact

f.computers and their data

g.high

答案:

1.

(1)e (2)b (3)f (4)c

(5)a (6)d (7)g

2829f2ca24f0d0090cbba57f30759f23.png

计算机领域中有安全问题吗.doc

下载Word文档到电脑,方便收藏和打印[全文共1794字]

编辑推荐:

8b95f2eb3d3f7ce4dc3bf1178c74941e.png

8b95f2eb3d3f7ce4dc3bf1178c74941e.png

8b95f2eb3d3f7ce4dc3bf1178c74941e.png

8b95f2eb3d3f7ce4dc3bf1178c74941e.png

8b95f2eb3d3f7ce4dc3bf1178c74941e.png

下载Word文档

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值