首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer scre
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer scre
admin
2010-12-25
77
问题
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer screens from observation. Keeping printed information and computers in locked cabinets, and clearing desktops of sensitive documents prevent access to confidential information. But more sophisticated methods are also necessary to prevent computer crimes.
One technique to protect confidentiality is encryption. Information can be scrambled and unscrambled u-sing mathematical equations and a secret code called a key. Two keys ale usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge.
Another technique to prevent computer crime is to limit access of computer data files to approved users. Access control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top-secret information according to the corresponding security clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words.
Tokens are tamper-resistant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the token’s password, as well as another password entered by the user, and matches these two to an identical list In the future, passwords and tokens may be reinforced by biometrics, identification methods that use u-nique personal characteristics, such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typingrhythms.
Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computer’s functions.
"Vulnerable"in the last paragraph is closest in meaning to______.
选项
A、valuable
B、changeable
C、susceptible
D、dependable
答案
C
解析
文章指出,计算机网络很容易受到计算机犯罪的攻击。最后一段Computer networks,multiplecomputers linked together,are particularly vulnerable to computer crimes.
转载请注明原文地址:https://kaotiyun.com/show/HsBO777K
0
考博英语
相关试题推荐
Lookatthenotesaboutanenterprise.Someinformationismissing.YouwillhearpartofapresentationbytheInternationalMa
Lookatthenotesonhowtosucceedinajobinterview.Someinformationismissing.Youwillhearpartofapresentationbythe
Whyaretelephonenumberschanging?
PERSONALITY
Lookatthenotesbelow.Someinformationismissing.YouwillhearajournalisttalkingtotheHeadofPublicRelationsofala
Youwillhearaconversationonpublicrelations.Foreachquestion(23-30),markoneletter(A,B,orC)forthecorrectanswer
Thecustomercan’thavearefundbecause
•Readtheletterfromasalespersonenquiringaboutthetransportandaccommodationarrangementsforaconferenceyouhaveorga
BacktotheshopfloorotAttwood,ChiefExecutiveofAttwoodPublicity,hasattractedtheattentionofhisindustrybygoingto
Ⅱ.Direction:ReadthefollowingpassagecarefullyandthenexplaininyourownEnglishtheexactmeaningofthenumberedandun
随机试题
November7,2000isaveryspecialdayintheUnitedStates.Votersallacrossthenationare【21】representativesinlocalandnat
尿素呼吸试验的注意事项中错误的是
治疗胎热胎动不安治疗肝火犯胃呕吐、吞酸
在水泥混凝土坍落度试验中,从开始装料到提坍落度筒的整个过程应连续并在()内完成。
某高档超市为四层钢筋混凝土框架结构,建筑面积25000m2,建筑物总高度24m,抗震设防烈度为7度,Ⅱ类场地。框架柱原设计的纵筋为822;施工过程中,因现场原材料供应原因,拟用表1-3中的钢筋进行代换。试问,下列哪种代换方案最为合适?提示:下列4种
背景资料:某公司承建城市桥区泵站调蓄工程,其中调蓄池为地下式现浇钢筋混凝土结构,混凝土强度等级C35,池内平面尺寸为62.0m×17.3m,筏板基础。场地地下水类型为潜水,埋深6.6m。设计基坑长63.8m,宽19.1m,深12.6m,围护结
节目的后期制作不包括()。
分析学习与教学的三个过程。
我国宪法规定,中华人民共和国公民在()的情况下,有获得物质帮助的权利。
一笔钱购买A型彩色电视机,若买5台余2500元,若买7台则缺4500元,今将这笔钱用于购买B型彩色电视机,正好可购8台,B型彩色电视机每台的售价是()。
最新回复
(
0
)