首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer scre
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer scre
admin
2010-12-25
62
问题
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer screens from observation. Keeping printed information and computers in locked cabinets, and clearing desktops of sensitive documents prevent access to confidential information. But more sophisticated methods are also necessary to prevent computer crimes.
One technique to protect confidentiality is encryption. Information can be scrambled and unscrambled u-sing mathematical equations and a secret code called a key. Two keys ale usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge.
Another technique to prevent computer crime is to limit access of computer data files to approved users. Access control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top-secret information according to the corresponding security clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words.
Tokens are tamper-resistant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the token’s password, as well as another password entered by the user, and matches these two to an identical list In the future, passwords and tokens may be reinforced by biometrics, identification methods that use u-nique personal characteristics, such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typingrhythms.
Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computer’s functions.
According to paragraph 2 , the keys are changed frequently in order to______.
选项
A、encode more data
B、decode more data
C、give people more private keys
D、make information difficult to decode
答案
D
解析
文章指出,密钥定期改良,进一步阻止了未经允许的访问,并使加密信息难于解密。第二段Thekeys are modified periodically further hampering unauthorized access and makingthe encrypted infor-mation difficult to decode or forge.
转载请注明原文地址:https://kaotiyun.com/show/WsBO777K
0
考博英语
相关试题推荐
OnwhichflooristhePersonnelDepartmentlocated?
Youwillheartwotelephoneconversations.Writedownonewordornumberinthespacesontheformsbelow.Message1Questions
Whyaretelephonenumberschanging?
Lookatthepassagebelow.Someinformationismissing.Youwillhearawomantalkingaboutpersonalexperience.Foreachquesti
HowtoapproachWritingTestPartTwo•Thisparttestsyourabilitytowritelongerletters,faxesandemails.•Readtheinstruc
HowtoapproachWritingTestPartOneThisparttestsyour’abilitytowriteshortmemos,emailsandnotes.Readtheins
Mindyourhead.Delegatesareaskedtocheckoutby10:30a.m.Thedelegatesshouldleavetheirrooms.
Theminimumrelevantprofessionalexperiencerequiredistenyears.
Ascorchingsun,anendlessseaofsandandawaterless,forbiddinglylonelyland—thatistheimagemostpeoplehaveofdeserts.
实行改革开放以来改变了过去封闭半封闭状态,提高了我国经济水平。
随机试题
“寺河山”出产的苹果营养丰富,口感独特,远近闻名,当地有关单位为了发展本地经济,准备采取相应保护措施,申请商标注册以扩大宣传,提高苹果的知名度。问:当地可以申请哪些商标进行有效保护?
子宫内膜癌术后放射治疗的指征
A一级医疗事故B二级医疗事故C三级医疗事故D四级医疗事故E医疗过失造成患者明显损害的其他后果的属于
药品经营质量管理规范的英文缩写为
根据《物业管理条例》规定,下列属于业主在物业管理活动中享有的权利的有()。
发展战略的环境目标其中应包括()等目标。
下列测验中,属于投射测验的是
只有每年训练兵团毕业生的前10名或驻扎兵团中经验丰富的士兵才能成为宪兵团成员,驻守在城墙内仅负责管理人民和维持秩序。所有驻扎兵团同样驻守在城墙内仅负责修理、维护和强化城墙。调查兵团并不驻扎在城墙内,仅负责城墙外的搜索和调查行动。训练兵团中的训练并非正式士兵
设JDK安装在“D:\JDK”文件夹下,应在PATH环境变量中设置“%PATH%;D:\JDK\bin”及在CLASSPATH环境变量中设置【】,才能保证在任何文件夹下均可以进行Java程序的编译及运行。
用于定义类的必不可少的C++关键字是
最新回复
(
0
)