This book is about security for computing systems,not banks.Consider the security differences between computing systems and banks.
• Size and portability.The physical devices in computing are so small that a thousand dollars of computing gear will fit comfortably in a briefcase,and ten thousand dollars’ worth can be carried comfortably in two arms.
• Ability to avoid physical contact.Electronic funds transfers account for most transfers of money between banks.For example,private companies pay employees by direct computer transfer instead of check.Utilities,insurance companies,and mortgage companies automatically process deductions against their clients’bank accounts.Customers can even bank at home,moving funds between accounts and arranging withdrawals by touch-tone phone access to a computer.
• Value of assets.The value of the information stored in a computer is also high.Some computers contain confidential information about a person’s taxes,investments,medical history,or education.Other computers contain very sensitive information about new product lines,sales figures,marketing strategy,or military targets,troop movements,weapons capabilities and so forth.
In terms of security,computing is very close to the v,ild wept days.At some installations,computers and their data have been recognized as a valuable and vulnerable resource,and appropriate protection has been applied.Other installations are dangerously deficient in their security measures.But,unlike the“wild west”bankers,some computing professionals and managers do not even recognize the value of the resources they use or control.
Worse yet,in the even of a crime,some companies will not investigate or prosecute,for fear that it will damage their public image.For example,would you feel safe depositing your money in a bank that had just suffered a five million dollar loss through computer embezzlement?[1]
Criminal investigation and prosecution are hindered by statutes that do not recognize electromagnetic signals as property.The new、media have recently pictured computer intrusion by teenagers as pranks no more serious than tipping over an outhouse.
Obviously,security in computing is a very important issue.It is an area that deserves study by computer professionals,managers,and even many computer users.
NOTES
[1]这是一个疑问句,that引出的定语从句修饰bank。
KEYWORDS
security 安全(性)
alarm system 报警系统
portability 可携带性,可移植性
intrusion 入侵
EXERCISES
Fill in the blanks with appropriate words or phrases.
(1)Electronic funds transfers are able to avoid___with money.
(2)Private companies pay employees by___.
(3)At some installations,___have been recognized as a valuable and vulnerable resource.
(4)Because electromagnetic signals are not recognized as properly,___are hindered.
(5)___is an area that deserves study by computer professionals,managers,and even many computer users.
(6)Size of notebook computer is very___.
(7)The value of the information stored in a computer is___.
a.security in computing
b.direct computer transfer
c.criminal investigation and prosecution
d.small
e.physical contact
f.computers and their data
g.high
答案:
1.
(1)e (2)b (3)f (4)c
(5)a (6)d (7)g
计算机领域中有安全问题吗.doc
下载Word文档到电脑,方便收藏和打印[全文共1794字]
编辑推荐:
下载Word文档