首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer scre
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer scre
admin
2010-12-25
45
问题
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer screens from observation. Keeping printed information and computers in locked cabinets, and clearing desktops of sensitive documents prevent access to confidential information. But more sophisticated methods are also necessary to prevent computer crimes.
One technique to protect confidentiality is encryption. Information can be scrambled and unscrambled u-sing mathematical equations and a secret code called a key. Two keys ale usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge.
Another technique to prevent computer crime is to limit access of computer data files to approved users. Access control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top-secret information according to the corresponding security clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words.
Tokens are tamper-resistant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the token’s password, as well as another password entered by the user, and matches these two to an identical list In the future, passwords and tokens may be reinforced by biometrics, identification methods that use u-nique personal characteristics, such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typingrhythms.
Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computer’s functions.
"Vulnerable"in the last paragraph is closest in meaning to______.
选项
A、valuable
B、changeable
C、susceptible
D、dependable
答案
C
解析
文章指出,计算机网络很容易受到计算机犯罪的攻击。最后一段Computer networks,multiplecomputers linked together,are particularly vulnerable to computer crimes.
转载请注明原文地址:https://kaotiyun.com/show/HsBO777K
0
考博英语
相关试题推荐
Whatisthepercentageoftheincreaseinthenewordersthathasbeenagreedupon?
Lookatthenotesaboutanenterprise.Someinformationismissing.YouwillhearpartofapresentationbytheInternationalMa
Lookatthenotesonhowtosucceedinajobinterview.Someinformationismissing.Youwillhearpartofapresentationbythe
Youwillheartwotelephoneconversations.Writedownonewordornumberinthespacesontheformsbelow.Message1Questions
Whichdepartmentdoesthewomanworkfor?
Wagebillshaveincreasedbecause______.
•Readthefollowingpassageaboutsuccessfulbusinessexecutives.•Arethesentences16-22"Right"or"Wrong"?Ifthereisn’t
Recognizingtheshortageoftimeavailabletospendwiththeirchildren,working,motherssometimestake______intheconcepto
Shehasmanyreasonstodisbelievewhathesaid.(justify)______.
Trivialbreachesofregulationswecanpassover,butmoreseriousoneswillhavetobeinvestigated.
随机试题
甲公司向乙公司订购一批专门从澳大利亚进口的奶粉,乙公司在订立合同时将国产奶粉谎称为进口奶粉。甲公司事后得知实情,恰逢国产奶粉畅销,甲公司有意继续履行合同,乙公司则希望将这批货物以更高的价格售与他人。若下列情形均发生于合同订立之日起1年内,请回答下列问题并
设向量,如果,那么().
机床包括()等。
根据《文物保护法》的规定,迁移或者拆除()的,批准前须征得国务院文物行政部门同意。
为适应新形势的挑战,在积极扩大出口的同时,党中央确立了“走出去”的开放战略,鼓励有优势、有实力的企业走出去投资办厂,学习外国的先进经验,在经济全球化挑战的浪潮中,增强自身的竞争力。这是()。
一、注意事项请先仔细阅读给定的资料,然后按照后面提出的“作答要求”依次作答。二、给定资料1.“公共服务”无论是作为概念,作为经济、社会发展的一个标志,还是作为政府工作的一个重要内涵,很早就引起党和政府乃至普通公众的高度重视。2004年2月,
【禹贡学会】
(2015年单选11)空姐甲长期在国外购买化妆品,经无申报通道携带入境,交由其表妹在网店销售,偷逃高额海关关税,获利数额巨大。甲的行为应认定为()。
计算其中Ω是圆柱面x2+y2-2x=0,平面z=0,z=a(a>0)在第一卦限的区域.
Asthepaceoflifecontinuestoincrease,wearefastlosingtheartofrelaxation.Onceyouareinthehabitofrushingthroug
最新回复
(
0
)