Computer English
Chapter 10 Computer and
Network Security
Key points:
Key points:
useful terms and definitions
useful terms and definitions
of computer security
of computer security
Difficult points:
Difficult points:
distinguish between four
distinguish between four
kinds of computer security
kinds of computer security
breaches
breaches
Requirements:
Requirements:
1. Principle of easiest penetration
2. The kinds of computer security breaches
3. What is firewall
4. 了解科技论文标题的写法了解科技论文标题的写法
了解科技论文标题的写法了解科技论文标题的写法
10.1 Characteristics of Computer Intrusion and
Kinds of Security Breaches
New Words & Expressions:
breach 破坏breach 破坏,缺口,缺口 involve 包含involve 包含,涉及,涉及,也可不译,也可不译
breach breach 破坏破坏,,缺口缺口 involve involve 包含包含,,涉及涉及,,也可不译也可不译
depositor 寄托者depositor 寄托者 vulnerability 弱点vulnerability 弱点,攻击,攻击
depositor depositor 寄托者寄托者 vulnerability vulnerability 弱点弱点,,攻击攻击
perimeter 周围perimeter 周围,周边,周边 penetrate vtpenetrate vt. . 攻破攻破,攻击,攻击
perimeter perimeter 周围周围,,周边周边 penetrate penetrate vtvt. . 攻破攻破,,攻击攻击
Exposure 曝光Exposure 曝光,揭露,揭露 threat n. 威胁threat n. 威胁,恐吓,恐吓
Exposure Exposure 曝光曝光,,揭露揭露 threat n. threat n. 威胁威胁,,恐吓恐吓
asset 资产asset 资产 interruption 中断interruption 中断,打断,打断
asset asset 资产资产 interruption interruption 中断中断,,打断打断
interception 截取interception 截取 modification 修改modification 修改
interception interception 截取截取 modification modification 修改修改
fabricate v. 伪造fabricate v. 伪造 tamper v. 篡改tamper v. 篡改
fabricate v. fabricate v. 伪造伪造 tamper v. tamper v. 篡改篡改
spurious adj. 假的spurious adj. 假的
spurious adj. spurious adj. 假的假的
Abbreviations:
10.1 Characteristics of Computer Intrusion and
Kinds of Sec