首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
16
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、SP
B、IdM
C、Internet
D、entity
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/3MTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2014上集管)在完成项目估算后,要制定项目的成本预算,其基本流程是:①将项目总成本分摊到各个工作包:②______;③确定各项成本再分配的时间:④确定项目成本预算计划。
(2012下集管)______技术是确定为了完成项目工作所需要的资源和技能水平的最佳方法
(2008下项管)(2009上项管)(2010上项管)某工程包括A、B、C、D、E、F、G七项工作,各工作的紧前工作、所需时间以及所需人数如下表所示(假设每个人均能承担各项工作):该工程的工期应为______(1)天。按此工期,整个工程最少需要____
(2014下集管)根据《信息技术软件工程术语GB/T11457—2006》的规定,______是计算机程序中的一个点,在此点检验或记录程序的状态、状况或结果。
(2012上项管)配置管理中有一项工作是变更控制,其中配置状态的过程如下图所示:在这个状态变化过程中,图中的(1)、(2)、(3)三个状态依次为______。
(2011上集管)下列关于冲突及其解决方式的描述中,不正确的是______。
(2009上软评)下面关于加密的说法中,错误的是______。
(2008下监理)某网络用户能进行QQ聊天,但在浏览器地址栏中输入www.rkb.gov.cn却不能正常访问该页面,此时管理员应检查______。
(2011下项管)系统工程师小李希望查询到中国计算机职业技术资格网(http://www.rkb.gov.cn)的Web服务器的IP地址,他在一台连接到互联网的工作站上用命令行方式进行查询,下列命令中的______无法让小李查询到该网站的IP地址。
以下关于入侵检测系统的描述中,说法错误的是______。A.入侵检测系统能够对网络活动进行监视B.入侵检测能简化管理员的工作,保证网络安全地运行C.入侵检测是一种主动保护网络免受攻击的安全技术D.入侵检测是一种被动保护网络免受攻击的安全技术
随机试题
用彩色多普勒显示手指末端小动脉,应选择
肾病综合征患者尿中蛋白含量大多
高压变压器的容量一般是最大额定容量的
关于经纪活动的方式,说法正确的是()。
环境影响预测方法中,能定性反映的有()。
商业银行在计算资本充足率时,监管资本需要扣除的是()。
龙龙认为“儿子”就是年龄比较小的人,他知道自己是爸爸的儿子,却不能理解爸爸也是儿子。说明他的思维属于()
在窗体中添加一个名称为Command1的命令按钮,然后编写如下程序:PublicxAsIntegerPrivateSubCommand1_Click()x=3Callf1Callf2MsgBoxxEndSubPrivate
IfI______enoughmoney,I______aroundtheworld.
TheChinesegovernmenthasofferedgreatsupporttoTibetintermsofmanpower,materialresources,fundingandtechnology.
最新回复
(
0
)